Monarchy Analisi

IOB - Indicator of Behavior (43)

Sequenza temporale

Linguaggio

ru26
en12
fr6

Nazione

ru40
us4

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Google Chrome12
OTCMS4
Twitter Recommendation Algorithm2
D-Link Go-RT-AC7502
Google Android2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1Fluent Fluentd/Fluent-ui autenticazione debole5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000810.03CVE-2020-21514
2SourceCodester E-Commerce System setDiscount.php sql injection6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001520.14CVE-2023-1505
3Zoom Client for IT race condition7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.03CVE-2023-22883
4Google Chrome Browser History buffer overflow5.55.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002680.00CVE-2023-1820
5Google Chrome WebShare Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001600.04CVE-2023-1821
6D-Link Go-RT-AC750 soapcgi.main escalazione di privilegi7.67.5$5k-$25k$5k-$25kNot DefinedNot Defined0.006450.04CVE-2023-26822
7Convert To Pipeline Plugin Freestyle Project Configuration escalazione di privilegi7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.001740.00CVE-2023-28677
8Keycloak autenticazione debole5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000650.04CVE-2023-0264
9WellinTech KingHistorian Network Packet SORBAx64.dll Remote Code Execution8.78.6$0-$5k$0-$5kNot DefinedNot Defined0.001540.00CVE-2022-43663
10Adobe Animate buffer overflow7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.066770.02CVE-2023-22243
11unpoly-rails Gem Header denial of service5.75.7$0-$5k$0-$5kNot DefinedOfficial Fix0.002370.02CVE-2023-28846
12Twitter Recommendation Algorithm denial of service5.35.2$0-$5k$0-$5kNot DefinedNot Defined0.001110.02CVE-2023-29218
13OTCMS apiRun.php AutoRun cross site scripting4.44.3$0-$5k$0-$5kNot DefinedNot Defined0.000620.17CVE-2023-1635
14OTCMS escalazione di privilegi7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001190.09CVE-2023-1797
15Huawei EMUI/HarmonyOS WLAN Module escalazione di privilegi5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002210.00CVE-2022-39009
16TP-Link AX1800 Firmware Parser buffer overflow6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.02CVE-2023-27346
17NoMachine escalazione di privilegi6.86.7$0-$5k$0-$5kNot DefinedNot Defined0.000480.03CVE-2022-34043
18sjqzhang go-fastdfs File Upload uploa upload Remote Code Execution8.17.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001760.14CVE-2023-1800
19Google Chrome FedCM Privilege Escalation5.55.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002060.04CVE-2023-1823
20Google Chrome Intents Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002060.00CVE-2023-1817

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDindirizzo IPHostnameAttoreCampagneIdentifiedGenereFiducia
145.76.47.21845.76.47.218.vultr.comMonarchy22/07/2021verifiedMedia
2XXX.XXX.XX.XXXXxxxxxxx22/07/2021verifiedAlto
3XXX.XXX.XXX.XXXxxxxxxxxxxxxxxxxx-xxxxxxx.xxxxxx.xxXxxxxxxx22/07/2021verifiedAlto
4XXX.XXX.XXX.XXXXxxxxxxx22/07/2021verifiedAlto

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitàAccesso al vettoreGenereFiducia
1T1006CWE-24Path TraversalpredictiveAlto
2T1059CWE-94Argument InjectionpredictiveAlto
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
4TXXXX.XXXCWE-XXXXxx Xx Xxxx-xxxxx XxxxxxxxpredictiveAlto
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveAlto
6TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveAlto
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveAlto
8TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveAlto

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File/ecommerce/admin/settings/setDiscount.phppredictiveAlto
2File/group1/uploapredictiveAlto
3FileapiRun.phppredictiveMedia
4Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveAlto
5Filexxxxxxx.xxxxpredictiveMedia
6Filexxxxxxxxxxxx.xxx?xxxx=xxxpredictiveAlto
7Libraryxxxxxxxx.xxxpredictiveMedia
8ArgumentxxpredictiveBasso
9ArgumentxxxxpredictiveBasso
10ArgumentxxpredictiveBasso
11ArgumentxxxxxxxpredictiveBasso
12ArgumentxxxpredictiveBasso
13Argumentx-xx-xxxxxxxxpredictiveAlto
14Input Valuexxxxxx xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)predictiveAlto

Referenze (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!