Camaro Dragon Análise

IOB - Indicator of Behavior (198)

Curso de tempo

Idioma

en98
zh96
pl2
es2

País

cn132
us56
gb8

Actores

Actividades

Interesse

Curso de tempo

Tipo

Fabricante

Produto

Microsoft Windows6
Apache HTTP Server6
Envoy6
QNAP Photo Station4
QNAP QTS4

Vulnerabilidades

#VulnerabilidadeBaseTemp0dayHojeExpMasEPSSCTICVE
1Kibana TSVB Prototype direitos alargados7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000920.00CVE-2020-7013
2jforum User direitos alargados5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.002890.04CVE-2019-7550
3Kubernetes kubelet pprof Divulgação de Informação7.37.2$0-$5k$0-$5kNot DefinedOfficial Fix0.556250.00CVE-2019-11248
4Hughes HX200/HX90/HX50L/HN9460/HN7000S Roteiro Cruzado de Sítios5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.001130.00CVE-2023-22971
5Git Plugin Build direitos alargados6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.011560.09CVE-2022-36883
6Apache HTTP Server HTTP/2 Request direitos alargados6.46.4$5k-$25k$5k-$25kNot DefinedNot Defined0.006060.04CVE-2020-9490
7Laravel FileCookieJar.php direitos alargados6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000490.04CVE-2022-30779
8Ghost CMS direitos alargados5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.008130.00CVE-2022-28397
9TP-Link WRD4300 Web Interface Divulgação de Informação4.34.3$0-$5k$0-$5kNot DefinedOfficial Fix0.168110.00CVE-2020-35575
10Next.js Directório Traversal5.04.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002130.04CVE-2020-5284
11QNAP Photo Station Roteiro Cruzado de Sítios5.24.9$0-$5kCalculadoNot DefinedOfficial Fix0.001150.00CVE-2018-19954
12QNAP Video Station direitos alargados6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001360.00CVE-2021-28812
13QNAP QTS Photo Station Roteiro Cruzado de Sítios4.84.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001150.00CVE-2020-2491
14Linksys WVC54GCA/WVC80N snapshot.cgi sub_AE64 Divulgação de Informação9.89.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.04
15Kibana TSVB Visualization Stored Roteiro Cruzado de Sítios4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000540.00CVE-2020-7015
16Hestia Control Panel Domain Name Privilege Escalation5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.001390.00CVE-2021-27231
17codeprojects Farmacia index.php Injecção SQL6.76.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.000640.06CVE-2023-5471
18phpMyAdmin Error Reporting Page File direitos alargados5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.001590.00CVE-2014-8961
19Apache Struts ParametersInterceptor getClass Negação de Serviço5.34.6$5k-$25k$0-$5kHighOfficial Fix0.970930.00CVE-2014-0094
20ThinkPHP direitos alargados7.67.5$0-$5k$0-$5kNot DefinedNot Defined0.001770.00CVE-2022-45982

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDEndereço IPHostnameActorCampanhasIdentifiedTipoAceitação
15.188.33.190helenacarlson.lpCamaro Dragon02/06/2023verifiedAlto
2XX.XXX.XXX.XXXxxxxx Xxxxxx02/06/2023verifiedAlto
3XXX.XXX.XXX.XXXxxxxx Xxxxxx02/06/2023verifiedAlto
4XXX.XXX.XX.XXXXxxxxx Xxxxxx02/06/2023verifiedAlto

TTP - Tactics, Techniques, Procedures (15)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (79)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTipoAceitação
1File/app1/admin#foopredictiveAlto
2File/cgi-bin/gopredictiveMédio
3File/config/server.xmlpredictiveAlto
4File/coreframe/app/guestbook/myissue.phppredictiveAlto
5File/data/config.ftp.phppredictiveAlto
6File/debug/pprofpredictiveMédio
7File/include/helpers/upload.helper.phppredictiveAlto
8File/info.xmlpredictiveMédio
9File/Items/*/RemoteImages/DownloadpredictiveAlto
10File/xxxpredictiveBaixo
11File/xxxxxx/xxxxxxx/predictiveAlto
12File/xxxx/xxx/x/xxxx/xxxxxxpredictiveAlto
13File/xxx-xpredictiveBaixo
14File/xxxxxxx/predictiveMédio
15File/xxxxxxpredictiveBaixo
16File/xxx-xxx/xxx.xxxpredictiveAlto
17File/xxxxxxxx/xxxpredictiveAlto
18Filexx/../../xxxxxxx/xxxx/xxxxxx/xxxxxx_#.xxxpredictiveAlto
19Filexxxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxxpredictiveAlto
20Filexxxxxxxx_xxxx.xxxpredictiveAlto
21Filexxx-xxx/xxxx_xxx.xxxpredictiveAlto
22Filexxxxxxx.xxxpredictiveMédio
23Filexxxx_xxxxx.xxxpredictiveAlto
24Filexxx/xxxxxxxx/xxxx.xpredictiveAlto
25Filexxxxxx/xxxxxxxxxxxpredictiveAlto
26Filexx_xxxx.xxxpredictiveMédio
27Filexxxxxxxxxx\xxxxxx\xxxxxxxxxxxxx.xxxpredictiveAlto
28Filexx_xxxxxxx.xpredictiveMédio
29Filexxx/xxxxxxxx.xxxpredictiveAlto
30Filexxx/xxxxxx.xxxpredictiveAlto
31Filexxxxx.xxxpredictiveMédio
32Filexxxxxxxxx.xxpredictiveMédio
33Filexxxxxxxxx/xxxxxxx/xxxxxxx/xxxxxxxxxxx.xxxpredictiveAlto
34Filexxxxxxxxx/xxxxxxx/xxxxxx/xxxxxxxxxx.xxxpredictiveAlto
35Filexxxxxxxxx/xxxxxxxxx/xxxxxxxx.xxxpredictiveAlto
36Filexxxxxx.xxxpredictiveMédio
37Filexxxxxx/xxxx_xxxxxxxxxxx.xxxpredictiveAlto
38Filexxxxx_xxxxxx_xxx.xxxpredictiveAlto
39Filexxxx.xxxpredictiveMédio
40Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveAlto
41Filexxx/xxxxxxx/xxxxxx/xxxx/xxxxx/xxxxxxx/xxxxxx/xxxxx/xxx%xxxxxxxxxxxxx.xx.xxxpredictiveAlto
42Filexxxxxxx.xxxpredictiveMédio
43Filexxxxxx\xxxxxxxx\xx_xxxxx_xxxxxxx.xxxpredictiveAlto
44Filexxxxxxx/predictiveMédio
45Filexxxxxxxxx.xxxpredictiveAlto
46Filexx-xxxxxxxxxxx.xxxpredictiveAlto
47Filexxxxxxxx.xpredictiveMédio
48Filexxxx.xxpredictiveBaixo
49Argument$xxxxxxpredictiveBaixo
50ArgumentxxxxxxpredictiveBaixo
51Argumentxxxxxxxxxx_xxxxx=x%xxpredictiveAlto
52Argumentxxxx_xxxxpredictiveMédio
53ArgumentxxxxxxxpredictiveBaixo
54ArgumentxxxxxxxxpredictiveMédio
55ArgumentxxpredictiveBaixo
56ArgumentxxxxxpredictiveBaixo
57ArgumentxxxxxpredictiveBaixo
58ArgumentxxxxxxpredictiveBaixo
59ArgumentxxxxxxxxpredictiveMédio
60ArgumentxxpredictiveBaixo
61ArgumentxxxxxpredictiveBaixo
62ArgumentxxxxxxpredictiveBaixo
63ArgumentxxxxxxxxxxpredictiveMédio
64ArgumentxxxxxxxxxxxxpredictiveMédio
65Argumentxx_xxxx_xxxxpredictiveMédio
66Argumentxxxxx_xxpredictiveMédio
67Argumentxxx_xxxpredictiveBaixo
68ArgumentxxxxxxxxpredictiveMédio
69Argumentxxxx_xxpredictiveBaixo
70ArgumentxxxxpredictiveBaixo
71ArgumentxxxxpredictiveBaixo
72Argumentxxxxxxxxx_xxxpredictiveAlto
73ArgumentxxxpredictiveBaixo
74ArgumentxxxxxpredictiveBaixo
75Argumentxxxxxx/xxxxxpredictiveMédio
76ArgumentxxxxxxxxpredictiveMédio
77Input Valuex%xxpredictiveBaixo
78Network Portxxx/xxxx (xx-xxx-xxxxxxx)predictiveAlto
79Network Portxxx xxxxxx xxxxpredictiveAlto

Referências (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!