LoggerMiner 解析

IOB - Indicator of Behavior (45)

タイムライン

言語

en26
zh10
ja6
es2
ru2

国・地域

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

HCL iNotes2
DZCP deV!L`z Clanportal2
Apache Log4j2
Oracle MySQL Server2
OpenSSH2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Apache Archiva File Upload Service クロスサイトスクリプティング5.15.1$5k-$25k$0-$5kNot DefinedNot Defined0.001080.00CVE-2023-28158
2Splunk Enterprise Forwarder Bundle 特権昇格8.58.3$0-$5k$0-$5kNot DefinedOfficial Fix0.003060.00CVE-2022-32158
3KubeVirt 特権昇格6.86.8$0-$5k$0-$5kNot DefinedNot Defined0.000620.05CVE-2022-1798
4virglrenderer IOCTL メモリ破損7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000450.00CVE-2022-0135
5Dreamer CMS クロスサイトスクリプティング4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000470.00CVE-2023-29774
6Weblogicnet es_desp.php 特権昇格7.36.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.088790.00CVE-2007-4715
7PrestaShop SQLインジェクション8.08.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.838960.00CVE-2021-3110
8Oracle MySQL Server Compiling サービス拒否7.27.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.04CVE-2021-22570
9Microsoft Outlook 弱い認証9.08.6$5k-$25k$0-$5kHighOfficial Fix0.926450.07CVE-2023-23397
10Apache Dubbo Generic Invoke 特権昇格5.05.0$5k-$25k$5k-$25kNot DefinedNot Defined0.014790.00CVE-2023-23638
11Grafana Authentication Cookies 情報の漏洩5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001010.02CVE-2022-39201
12Hugo Pandoc Document exec 特権昇格5.05.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002280.02CVE-2020-26284
13GNU C Library Call Graph Monitor gmon.c __monstartup メモリ破損 [係争状態]6.36.2$0-$5k$0-$5kNot DefinedOfficial Fix0.001210.06CVE-2023-0687
14nginx 特権昇格6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002411.40CVE-2020-12440
15Tecrail Responsive FileManager ajax_calls.php get_file ディレクトリトラバーサル6.45.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.044580.00CVE-2018-20792
16Google Chrome サービス拒否7.37.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.009890.00CVE-2011-2796
17Samsung TizenRT l2_packet_pcap.c l2_packet_receive_timeout サービス拒否5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.002700.00CVE-2022-40279
18Microsoft Internet Explorer FTP Server メモリ破損6.36.3$25k-$100k$0-$5kHighUnavailable0.969730.07CVE-2009-3023
19Microsoft Windows Shell Shortcut Parser 特権昇格10.09.5$25k-$100k$0-$5kHighOfficial Fix0.970860.04CVE-2010-2568
20TOTOLINK EX1200T 特権昇格6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.023000.00CVE-2021-42872

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
134.92.166.158158.166.92.34.bc.googleusercontent.comLoggerMiner2022年02月03日verified
2XX.XX.XXX.XXxx.xx.xxx.xx.xxxxx.xxxXxxxxxxxxxx2022年02月03日verified
3XXX.XXX.XXX.XXXxxxxxxxxxx2022年02月03日verified
4XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxxxxxxx2022年02月03日verified

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (20)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/see_more_details.phppredictive
2Fileajax_calls.phppredictive
3Fileapply.cgipredictive
4Filexxxxx-xxx.xpredictive
5Filexx_xxxx.xxxpredictive
6Filexxxx.xpredictive
7Filexxx/xxxxxx.xxxpredictive
8Filexx/xxxxpredictive
9Filexxxxxx.xxxpredictive
10Filexxxx-xxxxxx.xpredictive
11Filexxxx/xxxx/xxxxxxxxxxxxxxxxxx.xxxxpredictive
12Filexxx_xxxxxxxxxx/xxx/xx_xxxxxx/xx_xxxxxx_xxxx.xpredictive
13Libraryxxx.xxxpredictive
14Argumentxxxxxxxxpredictive
15Argumentxxxxx_xxxpredictive
16Argumentxxxx/xxpredictive
17Argumentxxpredictive
18Argumentxx_xxxxxxxxpredictive
19Argumentxxxxpredictive
20Argumentxxxxpredictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!