Sarwent 解析

IOB - Indicator of Behavior (18)

タイムライン

言語

en16
ru2

国・地域

us16
ua2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Dahua IPC-HDW1X2X6
Dahua IPC-HFW1X2X6
Dahua IPC-HDW2X2X6
Dahua IPC-HFW2X2X6
Dahua IPC-HDW4X2X6

脆弱性

#脆弱性BaseTemp0day本日修復CTIEPSSCVE
1Dahua IP Camera 特権昇格7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.030.00101CVE-2017-7253
2eSyndicat Directory Software suggest-listing.php クロスサイトスクリプティング3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00000
3Reolink RLC-410W Firmware Update Privilege Escalation5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00149CVE-2021-40419
4Dahua IPC-HDBW2XXX/IPC-HFW2XXX/ASI7XXXX ONVIF 弱い認証7.87.6$0-$5k計算中Not DefinedOfficial Fix0.010.00135CVE-2022-30563
5Dahua DH-IPC-Hxxxxxxxxx Authentication 弱い認証7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.000.03148CVE-2017-7927
6Dahua IPC-HDW1X2X IP Address 情報の漏洩5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00084CVE-2019-9680
7Dahua IPC-HDW1X2X Login 特権昇格6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00103CVE-2019-9678
8Dahua IPC-HDW1X2X Debug Function 特権昇格7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00104CVE-2019-9679
9Dahua IPC-HDW1X2X Online Upgrade Reverse Engineering 情報の漏洩5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00084CVE-2019-9681
10Dahua IPC-HDW1X2X CGI Interface メモリ破損8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00250CVE-2019-9677
11Dahua DHI-HCVR7216A-S3 MD5 特権昇格5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.020.31255CVE-2017-6343
12TP-Link TL-WR841N V13 Traceroute 特権昇格7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00770CVE-2020-35576
13PCCS-Linux MySQLDatabase Admin Tool dbconnect.inc Password 情報の漏洩7.37.0$5k-$25k計算中Not DefinedOfficial Fix0.020.00696CVE-2000-0707
14Red Hat Linux nfs-utils rpc.statd Format String9.88.8$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.040.08052CVE-2000-0666
15SonicWall SSLVPN SMA100 SQLインジェクション7.37.1$0-$5k$0-$5kFunctionalNot Defined0.020.02628CVE-2021-20016

キャンペーン (1)

These are the campaigns that can be associated with the actor:

  • Amnesty International and Pegasus

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
187.249.53.124713697-cj66716.tmweb.ruSarwentAmnesty International and Pegasus2021年09月30日verified
2XXX.XXX.XXX.XXXxxxxxxXxxxxxx Xxxxxxxxxxxxx Xxx Xxxxxxx2021年09月30日verified
3XXX.X.XX.XXXxxxx.xxxxxx.xxxxxxxXxxxxxxXxxxxxx Xxxxxxxxxxxxx Xxx Xxxxxxx2021年09月30日verified

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique脆弱性アクセスベクタータイプ信頼度
1T1040CWE-294Authentication Bypass by Capture-replaypredictive
2T1059.007CWE-80Cross Site Scriptingpredictive
3TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
4TXXXX.XXXCWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictive
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictive
6TXXXXCWE-XXXXxxxxxxxxx Xxxxxxpredictive
7TXXXXCWE-XXXxx Xxxxxxxxxpredictive
8TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (4)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1Filedbconnect.incpredictive
2Filexxx.xxxxxpredictive
3Filexxxxxxx-xxxxxxx.xxxpredictive
4Argumentxxxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!