Taidoor Análisis

IOB - Indicator of Behavior (149)

Cronología

Idioma

en86
zh50
es6
ko4
de2

País

cn106
us28
kr12
th2
jp2

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Linux Kernel4
systemd4
Apache HTTP Server4
Codelib Linker2
Pivotal Spring Framework2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConEPSSCTICVE
1Linksys WRT54G Web Server denegación de servicio5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.02
2Python mailcap Module escalada de privilegios7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001410.04CVE-2015-20107
3Dell EMC Unity/UnityVSA/Unity XT Upgrade Readiness Utility cifrado débil1.91.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.04CVE-2021-21547
4Simple Machines Forum LogInOut.php escalada de privilegios8.08.0$0-$5k$0-$5kNot DefinedOfficial Fix0.004890.00CVE-2016-5727
5Linux Kernel do_open_permission escalada de privilegios5.95.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2009-3286
6Dell PowerProtect DD cross site scripting6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000630.02CVE-2023-44286
7Cisco Firepower Threat Defense Security Intelligence Feed escalada de privilegios4.84.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.001230.00CVE-2022-20730
8H2 Database Engine CLI divulgación de información6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000420.02CVE-2022-45868
9nginx escalada de privilegios6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002413.73CVE-2020-12440
10Google Chrome Media Subsample Calculation/Conversion Remote Code Execution10.09.5$100k y más$0-$5kNot DefinedOfficial Fix0.008340.00CVE-2013-6637
11OAuth2 Proxy Domain Whitelist escalada de privilegios5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001290.00CVE-2021-21291
12PHP phpinfo cross site scripting4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.021010.04CVE-2007-1287
13Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash divulgación de información5.35.2$5k-$25k$0-$5kHighWorkaround0.020160.02CVE-2007-1192
14DZCP deV!L`z Clanportal config.php escalada de privilegios7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.55CVE-2010-0966
15Razer Synapse RazerConfigNative.dll escalada de privilegios6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000420.00CVE-2017-11653
16Apache Tomcat HTTP/2 GOAWAY Frame denegación de servicio6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.863290.03CVE-2017-5650
17LibTIFF TIFFYCbCrtoRGB escalada de privilegios5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.024000.00CVE-2010-2595
18Poppler Splash.cc blitTransparent divulgación de información7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.018450.00CVE-2019-10872
19Linux Kernel Driver memory.c desbordamiento de búfer5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000730.18CVE-2022-3523
20Apache Commons Compress denegación de servicio4.54.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000610.00CVE-2024-26308

IOC - Indicator of Compromise (44)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDdirección IPHostnameActorCampañasIdentifiedEscribeConfianza
158.40.20.165Taidoor2020-12-20verifiedAlto
259.120.127.259-120-127-2.hinet-ip.hinet.netTaidoor2022-04-06verifiedAlto
360.248.56.18560-248-56-185.hinet-ip.hinet.netTaidoor2022-04-06verifiedAlto
460.248.216.19460-248-216-194.hinet-ip.hinet.netTaidoor2020-12-20verifiedAlto
560.249.219.8260-249-219-82.hinet-ip.hinet.netTaidoor2020-12-20verifiedAlto
660.250.39.7360-250-39-73.hinet-ip.hinet.netTaidoor2020-12-20verifiedAlto
761.218.233.5161-218-233-51.hinet-ip.hinet.netTaidoor2020-12-20verifiedAlto
861.222.190.10061-222-190-100.hinet-ip.hinet.netTaidoor2020-12-20verifiedAlto
961.222.205.180mail.tami.org.twTaidoor2020-12-20verifiedAlto
10XX.XX.XX.XXXxxxx.xx.xx.xx.xxx.xxxxxx.xxXxxxxxx2020-12-20verifiedAlto
11XX.XXX.XX.XXxx.xxx.xx.xx.xxxxxxxxxx.xxxXxxxxxx2020-12-20verifiedAlto
12XX.XX.XX.XXXXxxxxxx2020-12-20verifiedAlto
13XX.XXX.XXX.XXXxx-xxx-xxx-xxx.xxxxxx-xx.xxxxxxxxxxx.xxxXxxxxxx2020-12-20verifiedAlto
14XX.XX.XXX.XXxxxxxx-xx-xx-xxx-xx.xxxxxx.xxxx.xxxxxxx.xxxXxxxxxx2022-04-06verifiedAlto
15XX.XX.XXX.XXxxxx-xx-xx-xxx-xx.xxxx.xxx.xx.xxxXxxxxxx2022-04-06verifiedAlto
16XX.XX.XXX.XXXxxxx-xx-xx-xxx-xxx.xxxxxxxx.xxxxxxxxxxxxx.xxXxxxxxx2020-12-20verifiedAlto
17XXX.XXX.XX.XXXxxxxxx2022-04-06verifiedAlto
18XXX.XXX.XX.XXXXxxxxxx2020-12-20verifiedAlto
19XXX.XX.XXX.XXXXxxxxxx2022-04-06verifiedAlto
20XXX.XX.XX.XXXXxxxxxx2022-04-06verifiedAlto
21XXX.XX.XXX.XXXXxxxxxx2022-04-06verifiedAlto
22XXX.XXX.XXX.XXXXxxxxxx2020-12-20verifiedAlto
23XXX.XX.XXX.XXxxxx-xxx-xx.xxxxxxxx.xxxXxxxxxx2020-12-20verifiedAlto
24XXX.XXX.XXX.XXXXxxxxxx2020-12-20verifiedAlto
25XXX.XX.XXX.XXXxxxxxx2020-12-20verifiedAlto
26XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxx.xxxXxxxxxx2020-12-20verifiedAlto
27XXX.XXX.XXX.XXXxxxxxx2020-12-20verifiedAlto
28XXX.XXX.XXX.XXXxxx-xxxxxx.xx.xxxxxxx.xxx.xxXxxxxxx2020-12-20verifiedAlto
29XXX.XXX.XXX.XXXXxxxxxx2020-12-20verifiedAlto
30XXX.XXX.XXX.XXXxxxxxxx.xxxxxxx.xx.xxXxxxxxx2020-12-20verifiedAlto
31XXX.XXX.XX.XXXXxxxxxx2022-04-06verifiedAlto
32XXX.XX.XXX.XXXXxxxxxx2022-04-06verifiedAlto
33XXX.XX.XX.XXxxxxxx.xxx.xxXxxxxxx2020-12-20verifiedAlto
34XXX.XX.XX.XXxxx-xxx-xx-xx.xxxxxxxxxxx.xxxXxxxxxx2022-04-06verifiedAlto
35XXX.XX.XXX.XXXxxx-xx-xxx-xxx.xxxxx-xx.xxxxx.xxxXxxxxxx2022-04-06verifiedAlto
36XXX.XX.XX.XXXxxx-xx-xx-xxx.xxxxx-xx.xxxxx.xxxXxxxxxx2020-12-20verifiedAlto
37XXX.XX.XXX.XXxxxxxx2020-12-20verifiedAlto
38XXX.XX.XX.XXXXxxxxxx2020-12-20verifiedAlto
39XXX.XX.XXX.XXXXxxxxxx2022-04-06verifiedAlto
40XXX.XX.XXX.XXXXxxxxxx2022-04-06verifiedAlto
41XXX.XXX.XXX.XXXxxxxxxxxxxx-xxx.xxx.xxxXxxxxxx2020-12-20verifiedAlto
42XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxx.xxxxxx.xxXxxxxxx2022-04-06verifiedAlto
43XXX.XXX.XXX.XXXxxxxxx2020-12-20verifiedAlto
44XXX.XX.XXX.XXxx-xxx-xx-xxx-xx-xxxx.xxxXxxxxxx2022-04-06verifiedAlto

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (60)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/api/adduserspredictiveAlto
2File/api/baskets/{name}predictiveAlto
3FileAuth/Manager.phppredictiveAlto
4Fileawstats.plpredictiveMedio
5Fileboard.phppredictiveMedio
6Fileconf.cpredictiveBajo
7Filecrc32.cpredictiveBajo
8Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
9FilexxxxxxxxpredictiveMedio
10Filexxxxx_xxxxxxx_xxxx.xxxxx.xxxpredictiveAlto
11Filexxxxxxxx.xxxpredictiveMedio
12Filexxxxx.xxxpredictiveMedio
13Filexxx-xxxxpredictiveMedio
14Filexxx/xxxxxx.xxxpredictiveAlto
15Filexxxxx.xxxpredictiveMedio
16Filexxxxxxxxxxxxx-xxxx.xx.xpredictiveAlto
17Filexxxxx.xxxpredictiveMedio
18Filexxxxxxxx.xxxpredictiveMedio
19Filexx/xxxxxx.xpredictiveMedio
20Filexxx_xxxxx.xxxpredictiveAlto
21Filexxx/xxx/xxx_xxxxxx.xpredictiveAlto
22Filexxxxx.xpredictiveBajo
23Filexxxxx.xxxxpredictiveMedio
24Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveAlto
25Filexxxxxxxxxx.xxx/xxxxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
26Filexxxxxxxxxx.xxxpredictiveAlto
27Filexxxxxx/xxxxx/xxx.xpredictiveAlto
28Filexxxx/xxxxxxxpredictiveMedio
29Filexxxxxx.xxxpredictiveMedio
30Filexxxxxxxxxxxxxxxx.xxxpredictiveAlto
31Filexxxxxxxxxxxxxxx.xxxpredictiveAlto
32Filexxxxxx/xxxxxx.xxpredictiveAlto
33Filexxxxxxx/xxxxxxxx.xpredictiveAlto
34Filexxxxx/xxxxxxxx.xpredictiveAlto
35Filexx-xxxxx/xxxxx-xxxxxx.xxxpredictiveAlto
36Filexx-xxxxx/xxxx.xxxpredictiveAlto
37Filexxxxxx.xxxpredictiveMedio
38Libraryxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
39Libraryxxx/xx_xxx.xpredictiveMedio
40Libraryxxxxx.xxxpredictiveMedio
41LibraryxxxxpredictiveBajo
42ArgumentxxxpredictiveBajo
43Argumentxxxxxx_xxxxxxpredictiveAlto
44ArgumentxxxxxxxxpredictiveMedio
45Argumentxxxxxxxxxx_xxxxpredictiveAlto
46ArgumentxxxpredictiveBajo
47ArgumentxxxxxxpredictiveBajo
48Argumentxxxx_xxxxxxpredictiveMedio
49ArgumentxxpredictiveBajo
50ArgumentxxxxpredictiveBajo
51Argumentxxxx_xxpredictiveBajo
52ArgumentxxxxxxpredictiveBajo
53ArgumentxxxpredictiveBajo
54ArgumentxxxxxpredictiveBajo
55ArgumentxxxpredictiveBajo
56Argumentxx_xxxxxxxpredictiveMedio
57ArgumentxxxpredictiveBajo
58Argumentxxxxxx-xxx[x][xxxx_xxxx]predictiveAlto
59Input Value<xxx>%xxpredictiveMedio
60Pattern|xx xx xx|predictiveMedio

Referencias (3)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!