XDSpy Analisi

IOB - Indicator of Behavior (14)

Sequenza temporale

Linguaggio

en10
es4

Nazione

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Apple macOS4
Oracle iPlanet Web Server2
OTRS2
Google Chrome OS2
GNU C Library2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1GNU C Library vfprintf Local Privilege Escalation7.87.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.012960.00CVE-2012-0864
2nginx URI String escalazione di privilegi6.56.2$0-$5k$0-$5kNot DefinedOfficial Fix0.954330.04CVE-2013-4547
3Apache HTTP Server mod_proxy buffer overflow7.36.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.012280.02CVE-2004-0492
4Postfix Admin functions.inc.php sql injection7.37.0$5k-$25k$0-$5kHighOfficial Fix0.002530.05CVE-2014-2655
5Apple macOS iBooks Redirect6.25.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.002330.00CVE-2017-2497
6Apple macOS libarchive escalazione di privilegi5.45.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.07CVE-2016-7619
7HPE Aruba ClearPass escalazione di privilegi9.28.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.026240.00CVE-2017-5824
8Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash rivelazione di un 'informazione5.35.2$5k-$25kCalcoloHighWorkaround0.020160.02CVE-2007-1192
9DZCP deV!L`z Clanportal config.php escalazione di privilegi7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.87CVE-2010-0966
10Google Chrome OS Format String8.88.4$100k et plus$5k-$25kNot DefinedOfficial Fix0.003450.00CVE-2016-5169
11phpEventMan text.ctrl.php escalazione di privilegi7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.149020.00CVE-2007-0702
12OTRS sql injection6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.003350.00CVE-2010-0438
13OTRS StateGetStatesByType sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.004070.00CVE-2014-1471
14Oracle iPlanet Web Server Administration Console cross site scripting6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.008680.00CVE-2012-0516

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDindirizzo IPHostnameAttoreCampagneIdentifiedGenereFiducia
162.213.213.17062-213-213-170.ip.stuart.beXDSpy31/05/2021verifiedAlto
2XX.XX.XXX.XXxx-xx-xxx-xx.xxxxx.xxxxxxxxxx.xxXxxxx31/05/2021verifiedAlto
3XX.XXX.XX.XXxx-xx-xxx-xx.xxxx.xxxxx.xxxXxxxx31/05/2021verifiedAlto

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClasseVulnerabilitàAccesso al vettoreGenereFiducia
1T1059CAPEC-242CWE-94Argument InjectionpredictiveAlto
2T1059.007CAPEC-18CWE-80Cross Site ScriptingpredictiveAlto
3TXXXXCAPEC-122CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
4TXXXX.XXXCAPEC-178CWE-XXXXxxx XxxxxxxxpredictiveAlto
5TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveAlto
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1Filedata/gbconfiguration.datpredictiveAlto
2Filefunctions.inc.phppredictiveAlto
3Filexxx/xxxxxx.xxxpredictiveAlto
4Filexxxx.xxxx.xxxpredictiveAlto
5ArgumentxxxxxxxxpredictiveMedia
6Argumentxxxxxxx-xxxxxxpredictiveAlto
7ArgumentxxxxxpredictiveBasso
8Argumentxxxx_xxxxxpredictiveMedia
9Patternxxxxxxx-xxxxxx|xx|predictiveAlto

Referenze (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!