Bublik Analyse

IOB - Indicator of Behavior (7)

Chronologie

Langue

en8

De campagne

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

Synacor Zimbra Collaboration Suite2
Saifor CVMS HUB2
Microsoft Windows2

Vulnérabilités

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnérabilitésVecteur d'accèsTaperConfiance
1T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveÉlevé
2TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveÉlevé
3TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
4TXXXXCWE-XXXxx XxxxxxxxxpredictiveÉlevé
5TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveÉlevé

IOA - Indicator of Attack (6)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1File/cvms-hub/privado/seccionesmib/secciones.xhtmlpredictiveÉlevé
2Filekbdint.cpredictiveMoyen
3Filexxxxxxxxxxxx.xxxxpredictiveÉlevé
4Filexxx-xxxx.xpredictiveMoyen
5Filexxxxxxxxxxxxx.xxpredictiveÉlevé
6Argumentx-xxxxpredictiveFaible

Références (6)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!