Monokle Analisi

IOB - Indicator of Behavior (1000)

Sequenza temporale

Linguaggio

en926
ru36
fr28
zh4
de4

Nazione

tt550
ru44
us40
al2

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Linux Kernel22
Juniper Junos OS Evolved20
Juniper Junos OS18
Google Android12
Oracle VM VirtualBox10

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1Linux Kernel API io_uring Privilege Escalation8.88.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000460.02CVE-2022-2602
2Linux Kernel kcm kcmsock.c kcm_tx_work race condition2.62.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.13CVE-2022-3521
3Linux Kernel Socket Buffer sch_sfb buffer overflow6.05.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000460.00CVE-2022-3586
4Google Android HTBLogKM buffer overflow7.87.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000420.00CVE-2021-0699
5Linux Kernel Driver memory.c buffer overflow5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000730.07CVE-2022-3523
6Linux Kernel IPv6 ipv6_renew_options denial of service5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2022-3524
7Linux Kernel BPF spl2sw_driver.c spl2sw_nvmem_get_mac_address buffer overflow6.36.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2022-3541
8Linux Kernel nftables nft_osf_eval rivelazione di un 'informazione4.74.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-42432
9Linux Kernel BPF usdt.c parse_usdt_arg denial of service4.24.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.04CVE-2022-3533
10Linux Kernel libbpf btf_dump.c btf_dump_name_dups buffer overflow6.36.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.09CVE-2022-3534
11Linux Kernel Bluetooth l2cap_core.c l2cap_conn_del buffer overflow6.66.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.001430.09CVE-2022-3640
12Linux Kernel BlueZ jlink.c jlink_init denial of service3.63.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.08CVE-2022-3637
13Linux Kernel skb macvlan.c macvlan_handle_frame denial of service6.06.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000970.08CVE-2022-3526

IOC - Indicator of Compromise (18)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (14)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (97)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File/admin/accesspredictiveAlto
2File/admin/students/manage.phppredictiveAlto
3File/goform/SetFirewallCfgpredictiveAlto
4File/goform/SetPptpServerCfgpredictiveAlto
5File/goform/SetSysTimeCfgpredictiveAlto
6File/goform/SetVirtualServerCfgpredictiveAlto
7File/htmlcode/html/reboot.cgipredictiveAlto
8File/php-sms/classes/Master.phppredictiveAlto
9File/php-sms/classes/SystemSettings.phppredictiveAlto
10File/queuing/login.phppredictiveAlto
11File/sacco_shield/manage_payment.phppredictiveAlto
12Filexxx-xxxxxxx.xxxpredictiveAlto
13Filexxxxx/xxxxxxxx/xxxxxxxxx/xxxx.xxxxpredictiveAlto
14Filexxxxxxxxxxxx.xxxpredictiveAlto
15Filexxxxxxxxxxxxx.xxxpredictiveAlto
16Filexxxxxxxxxxxxxxx.xxxpredictiveAlto
17Filexxxxxxxxx.xpredictiveMedia
18Filexxxxxxxxxxx.xxxpredictiveAlto
19Filexxxxx-xxx.xpredictiveMedia
20Filexxxxxxx.xxxpredictiveMedia
21Filexxxxxx.xpredictiveMedia
22Filexxxxxxxxx.xxxpredictiveAlto
23Filexxxxxx/xxx.xpredictiveMedia
24Filexxxxx.xxxpredictiveMedia
25Filexxxxxxxxxxxxxxxx.xxxpredictiveAlto
26Filexxx_xxxx_xxxxx_xx.xxxpredictiveAlto
27Filexxxxxx/xxxx-xxxxxxx.xxxpredictiveAlto
28Filexxxxxxx/xxx/xxxxxxxx.xpredictiveAlto
29Filexxxxxxx/xxxx/xxxxx/xxxxx_xxxx.xpredictiveAlto
30Filexxxxxxx/xxx/xxxxxxx/xxxx_xxx.xpredictiveAlto
31Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxx/xxxxx_xxxxxxx.xpredictiveAlto
32Filexxxxxxx/xxx/xxxxxxxx/xxxxxxxx/xxx_xxx.xpredictiveAlto
33Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxx_xxxxxx.xpredictiveAlto
34Filexxxxxxx/xxx/xxxxxxx.xpredictiveAlto
35Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxxxx/xxxxxxxx_xxxxx.xpredictiveAlto
36Filexxxxxxxx.xxxpredictiveMedia
37Filexx/xxxxxxx/xxxxxx.xpredictiveAlto
38Filexx/xxxxxxxxx.xpredictiveAlto
39Filexx/xxxxxxx.xpredictiveMedia
40Filexx/xxxxxxx.xpredictiveMedia
41Filexx/xxxx/xxxxx/xxxxxxxxxx/xxxxxx_xxxxxxxx.xxxpredictiveAlto
42Filexxxxxx/xxxxxx.xpredictiveAlto
43Filexxxxx.xxxpredictiveMedia
44Filexx/xxxxxxx.xpredictiveMedia
45Filexx/xxxxxx.xpredictiveMedia
46Filexxxxxxx/xxxxx.xpredictiveAlto
47Filexxx/xxxxxxxxx/xxxxx_xxxx.xpredictiveAlto
48Filexxx/xxx/xxxxx/xxxxxxxxx.xpredictiveAlto
49Filexxx/xxxx/xxxxxxx.xpredictiveAlto
50Filexxx/xxx/xxxxxxx.xpredictiveAlto
51Filexxx/xxxx/xx_xxxx.xpredictiveAlto
52Filexxx_xxxxxxxx.xpredictiveAlto
53Filexxx.xxxpredictiveBasso
54Filexxx-xxxxxxxx.xxxpredictiveAlto
55Filexxxxx-xxxx.xpredictiveMedia
56Filexxxxxxxxxxxxxx.xxxpredictiveAlto
57Filexxxxxx_xxxxx.xxxpredictiveAlto
58Filexxxxxxxxxxxxxxx.xxxxpredictiveAlto
59Filexx_xxxx.xxpredictiveMedia
60Filexx_xxx.xxpredictiveMedia
61Filexxxxxx/xxxxxxxxx.xxpredictiveAlto
62Filexxxx.xxpredictiveBasso
63Filexxxxx/xxx/xxx/xxx_xxxx.xpredictiveAlto
64Filexxxxx/xxx/xxx/xxxx.xpredictiveAlto
65Filexxxxx/xxxx-xxxxxx.xpredictiveAlto
66Filexxxxx/xxxxxxx/xxxxxxxxx/xxx/xxxx_xxxxx/xxxxxx_xxxxx_xxxx.xpredictiveAlto
67Filexxx_xxxxxx.xpredictiveMedia
68Filexxxx/xxxx_xxxxxx.xpredictiveAlto
69ArgumentxxxxxxxxpredictiveMedia
70Argumentxxx_xxxpredictiveBasso
71ArgumentxxxxxxxxxxxxxxpredictiveAlto
72ArgumentxxxxxxxxxxpredictiveMedia
73ArgumentxxpredictiveBasso
74ArgumentxxxxxpredictiveBasso
75ArgumentxxxxxxxxxxxxxxpredictiveAlto
76ArgumentxxxxxxxxxxpredictiveMedia
77Argumentxxxxx xxxx/xxxxxx xxxx/xxxx xxxxpredictiveAlto
78Argumentxx_xxxx_xx/xx_xxxx_xxpredictiveAlto
79ArgumentxxpredictiveBasso
80ArgumentxxxxxxxxpredictiveMedia
81ArgumentxxxxxxxxxxxxxxpredictiveAlto
82ArgumentxxxxpredictiveBasso
83ArgumentxxxxxxpredictiveBasso
84ArgumentxxxxxxxpredictiveBasso
85ArgumentxxxxpredictiveBasso
86Argumentxxxx/xxxxxxxxxpredictiveAlto
87ArgumentxxxxxxxxxpredictiveMedia
88ArgumentxxxxxxxxpredictiveMedia
89Argumentxxx_xxxx_xxxxxx_xxxx_xxxxxxx_xxxxx_xxxxxxx_xxxxxx_xxxx_xx_xxxxxx_xxxxpredictiveAlto
90ArgumentxxxxxxpredictiveBasso
91Argumentxxx_xxxxpredictiveMedia
92ArgumentxxxxxxxxxxxpredictiveMedia
93ArgumentxxxxxxxpredictiveBasso
94Argumentxxx_xxpredictiveBasso
95ArgumentxxxxpredictiveBasso
96ArgumentxxxxxxxxpredictiveMedia
97Argumentxxxxxxxx/xxxxxxxxpredictiveAlto

Referenze (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!