PowerDuke Análisis

IOB - Indicator of Behavior (48)

Cronología

Idioma

en48

País

cn12
be10
us10
hu10
tr6

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Microsoft Windows10
Juniper Junos6
Samsung Galaxy S92
Ivan Cordoba Generic Content Management System2
Symantec Backup Exec2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConEPSSCTICVE
1Microsoft Windows LSA Remote Code Execution8.17.4$100k y más$5k-$25kUnprovenOfficial Fix0.906170.00CVE-2022-26925
2Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash divulgación de información5.35.2$5k-$25k$0-$5kHighWorkaround0.020160.02CVE-2007-1192
3Microsoft Windows Common Log File System Driver Privilege Escalation8.17.4$25k-$100k$5k-$25kUnprovenOfficial Fix0.001250.02CVE-2022-37969
4DZCP deV!L`z Clanportal config.php escalada de privilegios7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009431.60CVE-2010-0966
5Softomi Advanced C2C Marketplace Software sql injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000760.02CVE-2023-6145
6Microsoft Windows HTTP Request HTTP.sys escalada de privilegios7.37.0$25k-$100k$0-$5kHighOfficial Fix0.975370.02CVE-2015-1635
7Lanap BotDetect Captcha Asp.net escalada de privilegios5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.034040.02CVE-2006-2918
8Microsoft ASP.NET Core Kestrel Web Application escalada de privilegios8.07.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.027830.03CVE-2018-0787
9Red Hat WildFly Blacklist Filter File divulgación de información7.57.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.098170.00CVE-2016-0793
10CKeditor4 Instance Destroying cross site scripting5.05.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002920.02CVE-2023-28439
11SAP NetWeaver GetComputerSystem divulgación de información5.34.6$5k-$25k$0-$5kHighOfficial Fix0.031010.00CVE-2013-3319
12Microsoft Exchange Server Outlook Web Access logon.aspx escalada de privilegios7.97.9$5k-$25k$5k-$25kNot DefinedNot Defined0.003790.03CVE-2018-16793
13easyii CMS out cross site request forgery4.33.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001020.00CVE-2020-36534
14easyii CMS File Upload Management Upload.php file escalada de privilegios6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.001980.13CVE-2022-3771
15Microsoft ASP.NET Security Feature autenticación débil7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.004240.04CVE-2018-8171
16Plesk Obsidian Login Page escalada de privilegios5.85.7$0-$5k$0-$5kNot DefinedNot Defined0.001740.02CVE-2023-24044
17Microsoft Windows Scripting Language Remote Code Execution8.88.4$25k-$100k$5k-$25kFunctionalOfficial Fix0.204330.03CVE-2022-41128
18QNAP QVR escalada de privilegios9.89.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001600.04CVE-2022-27588
19Microsoft Windows User Profile Service Privilege Escalation7.26.8$25k-$100k$5k-$25kFunctionalOfficial Fix0.001020.03CVE-2022-26904
20Microsoft Windows Remote Desktop Protocol Remote Code Execution8.88.1$100k y más$5k-$25kUnprovenOfficial Fix0.014800.02CVE-2022-21893

Campañas (1)

These are the campaigns that can be associated with the actor:

  • PowerDuke

IOC - Indicator of Compromise (8)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilidadVector de accesoEscribeConfianza
1T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveAlto
2T1059CWE-94Argument InjectionpredictiveAlto
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
4TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveAlto
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveAlto
7TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveAlto
8TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto
9TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveAlto

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/admin/sign/outpredictiveAlto
2File/owa/auth/logon.aspxpredictiveAlto
3File/setup.cgipredictiveMedio
4Filexxxxxxxxxxxxx/xxx_xxxxxxxx.xxxpredictiveAlto
5Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
6Filexxxxxxx/xxxxxx.xxxpredictiveAlto
7Filexxxx.xxxpredictiveMedio
8Filexxx/xxxxxx.xxxpredictiveAlto
9ArgumentxxxxxxxxpredictiveMedio
10ArgumentxxxxpredictiveBajo
11ArgumentxxpredictiveBajo
12ArgumentxxxxxpredictiveBajo
13ArgumentxxxxxxxxpredictiveMedio
14Input Value/../predictiveBajo
15Network Portxxx/xxxxpredictiveMedio

Referencias (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!