SparklingGoblin Analyse

IOB - Indicator of Behavior (23)

Chronologie

Langue

en12
es4
pl2
zh2
de2

De campagne

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

EmpireCMS2
Laravel2
GitLab Community Edition2
GitLab Enterprise Edition2
SSH2

Vulnérabilités

#VulnérabilitéBaseTemp0dayAujourd'huiExpConCTIEPSSCVE
1SSH SSH-1 Protocol chiffrement faible7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00258CVE-2001-1473
2Microsoft Exchange Server Privilege Escalation8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.010.11112CVE-2023-32031
3IBM WebSphere Application Server Sequence elévation de privilèges9.29.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.060.00399CVE-2023-23477
4EmpireCMS AdClass.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00172CVE-2022-28585
5Veritas NetBackup dénie de service6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.000.00081CVE-2022-36984
6Geeklog Media Gallery ftpmedia.php elévation de privilèges7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.13104CVE-2007-2706
7Qt-cute QuickTalk guestbook qtg_msg_view.php sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.000.00269CVE-2007-3538
8GitLab Community Edition/Enterprise Edition ipynb File cross site scripting6.16.1$0-$5k$0-$5kNot DefinedNot Defined0.000.00089CVE-2021-39906
9Microsoft Power BI Report Server Privilege Escalation7.06.1$5k-$25k$0-$5kUnprovenOfficial Fix0.030.01237CVE-2021-31984
10Laravel Image Upload ValidatesAttributes.php elévation de privilèges5.55.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.01231CVE-2021-43617
11Apache HTTP Server mod_rewrite Redirect6.76.7$25k-$100k$5k-$25kNot DefinedNot Defined0.000.00258CVE-2020-1927
12Request Tracker File Upload cross site scripting5.24.9$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00107CVE-2016-6127
13RoundCube Webmail Password Plugin elévation de privilèges7.56.6$0-$5k$0-$5kNot DefinedOfficial Fix0.010.00338CVE-2017-8114
14Gallarific PHP Photo Gallery script gallery.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.00112CVE-2011-0519
15SoftEther VPN Server See.sys Kernel elévation de privilèges6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00044CVE-2019-11868
16Typecho write-post.php cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.030.00057CVE-2017-16230
17D-Link DNS-345 Cookie authentification faible8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00561CVE-2014-7857
18Zoho ManageEngine ServiceDesk Plus FileDownload.jsp directory traversal5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00556CVE-2011-2757
19Wired Community Software WWWThreads register.php sql injection6.56.2$0-$5k$0-$5kProof-of-ConceptUnavailable0.020.00471CVE-2006-1958
20Russcom Network Loginphp register.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptUnavailable0.040.00677CVE-2006-2160

Campagnes (1)

These are the campaigns that can be associated with the actor:

  • SideWalk

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnérabilitésVecteur d'accèsTaperConfiance
1T1006CWE-22Path TraversalpredictiveÉlevé
2T1059CWE-94Argument InjectionpredictiveÉlevé
3TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveÉlevé
4TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
5TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveÉlevé
6TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveÉlevé
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveÉlevé
8TXXXXCWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveÉlevé
9TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveÉlevé

IOA - Indicator of Attack (18)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1FileAdClass.phppredictiveMoyen
2Fileadmin/write-post.phppredictiveÉlevé
3FileFileDownload.jsppredictiveÉlevé
4Filexxxxxxx.xxxpredictiveMoyen
5Filexxxxxxxxxx/xxxxxxxxxx/xxxxxxxx/xxxxxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
6Filexxxxx/xxxxxxxx.xxxpredictiveÉlevé
7Filexxx_xxx_xxxx.xxxpredictiveÉlevé
8Filexxxxxxxx.xxxpredictiveMoyen
9Filexxxx.xxxpredictiveMoyen
10Filexxxx-xxxxxxxx.xxxpredictiveÉlevé
11Libraryxxx.xxxpredictiveFaible
12ArgumentxxxpredictiveFaible
13ArgumentxxxxxxxxpredictiveMoyen
14ArgumentxxpredictiveFaible
15ArgumentxxxxxxxxpredictiveMoyen
16ArgumentxxxxxxpredictiveFaible
17ArgumentxxxxxpredictiveFaible
18Argument_xx_xxxx[xxxx_xxxx]predictiveÉlevé

Références (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!