Dark Tequila Analiza

IOB - Indicator of Behavior (39)

Oś czasu

Język

en40

Kraj

us34

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Opera Web Browser4
MySQL Eventum4
Comcast DPC39392
Cisco IOS2
Linksys WRT54G Wireless-G Router2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1Siemens SiPass integrated File privilege escalation7.27.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000550.02CVE-2017-9940
2Microsoft Edge Scripting Engine memory corruption6.05.7$25k-$100k$0-$5kNot DefinedOfficial Fix0.005430.00CVE-2017-8661
3Comcast DPC3939B cross site request forgery6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.001120.00CVE-2017-9489
4Comcast DPC3939 Network Processor privilege escalation7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.001940.00CVE-2017-9481
5Linux Kernel XFRM xfrm_user_policy memory corruption6.35.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.001260.00CVE-2005-2456
6Mozilla Firefox String nieznana luka4.34.1$25k-$100k$0-$5kProof-of-ConceptUnavailable0.002070.05CVE-2005-2602
7Mozilla Thunderbird Long String Privilege Escalation6.36.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.00
8CA BrightStor ARCserve Backup Backup Agent memory corruption7.37.0$5k-$25k$0-$5kHighOfficial Fix0.971910.00CVE-2005-1272
9unzip File Decompression race condition6.36.3$5k-$25k$0-$5kNot DefinedUnavailable0.000640.00CVE-2005-2475
10MySQL Eventum Class sql injection6.36.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.000000.00
11Microsoft ActiveSync Equipment ID Reader Privilege Escalation6.35.7$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000000.00
12Microsoft ActiveSync Communication denial of service6.56.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
13MySQL Eventum view.php cross site scripting6.35.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.014200.00CVE-2005-2467
14MySQL Eventum list.php cross site scripting5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
15MySQL Eventum get_jsrs_data.php cross site scripting5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
16Cisco IOS IPv6 Stack denial of service7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.132570.00CVE-2005-2451
17Linksys WRT54G Wireless-G Router SSL Private Key Encryption nieznana luka6.55.7$5k-$25k$0-$5kUnprovenOfficial Fix0.010380.00CVE-2005-2434
18Novell eDirectory Modular Authentication Service weak authentication5.45.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
19Microsoft PowerPoint Shared Sections denial of service4.84.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
20Microsoft Word Shared Sections denial of service4.84.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueKlasaLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CAPEC-126CWE-22Path TraversalpredictiveWysoki
2T1059.007CAPEC-18CWE-80Cross Site ScriptingpredictiveWysoki
3TXXXXCAPEC-19CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
4TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveWysoki
5TXXXXCAPEC-102CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki
7TXXXXCAPEC-157CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveWysoki

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/etc/waipasspredictiveMedium
2Fileget_jsrs_data.phppredictiveWysoki
3Filexxxxxx??.xxxpredictiveMedium
4Filexxxx.xxxpredictiveMedium
5Filexxx-xxxx.xpredictiveMedium
6Filexxxx.xxxpredictiveMedium
7ArgumentxxpredictiveNiski
8ArgumentxxxxpredictiveNiski
9ArgumentxxxxxxxpredictiveNiski

Referencje (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!