Downeks 解析

IOB - Indicator of Behavior (13)

タイムライン

言語

en14

国・地域

us12
gb2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

OpenWrt4
AnyMacro AnyMacro Mail System2
FileZilla Server2
phpMyAdmin2
FUSE2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Alt-N MDaemon Worldclient 特権昇格4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000900.06CVE-2021-27182
2ABBYY FineReader License Server 特権昇格6.56.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2019-20383
3FileZilla Server PORT 特権昇格4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000520.12CVE-2015-10003
4FUSE fusermount 特権昇格6.56.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.001340.03CVE-2018-10906
5AnyMacro AnyMacro Mail System ディレクトリトラバーサル5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.001790.02CVE-2011-2468
6IBM FileNet Workplace XT File Upload 特権昇格7.57.5$5k-$25k$0-$5kNot DefinedNot Defined0.008980.03CVE-2016-8921
7phpMyAdmin import.php 特権昇格7.16.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.001310.04CVE-2013-4729
8OpenWrt/LEDE uhttpd cgi_handle_request Reflected クロスサイトスクリプティング5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000820.02CVE-2018-19630
9OpenWrt Access Control rpcd 特権昇格7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.002300.00CVE-2018-11116
10PunBB profile.php SQLインジェクション6.35.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.001620.02CVE-2005-1051
11Juniper Web Device Manager Authentication 弱い認証9.89.0$5k-$25k$0-$5kProof-of-ConceptWorkaround0.000000.00
12PHP FastCGI Process Manager php-fpm.conf.in 特権昇格5.95.2$25k-$100k$0-$5kUnprovenOfficial Fix0.000450.00CVE-2014-0185
13phpMyAdmin server_privileges.lib.php クロスサイトスクリプティング6.56.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.003060.00CVE-2016-2560

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
1185.141.25.68Downeks2020年12月23日verified

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique脆弱性アクセスベクタータイプ信頼度
1T1006CWE-22Path Traversalpredictive
2T1055CWE-74Improper Neutralization of Data within XPath Expressionspredictive
3TXXXX.XXXCWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
4TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
5TXXXX.XXXCWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictive
6TXXXXCWE-XXXxx Xxxxxxxxxpredictive
7TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive
8TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxxpredictive

IOA - Indicator of Attack (8)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/etc/config/rpcdpredictive
2Filecgi-bin/predictive
3Filexxxxxx.xxxpredictive
4Filexxx-xxx.xxxx.xxpredictive
5Filexxxxxxx.xxxpredictive
6Libraryxxxxxxxxx/xxxxxx_xxxxxxxxxx.xxx.xxxpredictive
7Argumentxxxxxxxxxxxxxpredictive
8Argumentxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!