Bublik Анализ

IOB - Indicator of Behavior (7)

Временная шкала

Язык

en8

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Synacor Zimbra Collaboration Suite2
ProFTPD2
Microsoft Windows2

Уязвимости

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-адресHostnameАкторКампанииIdentifiedТипУверенность
166.23.234.229host.double-six.netBublik28.06.2023verifiedВысокий
266.128.53.179Bublik22.07.2021verifiedВысокий
3XX.XX.XX.XXXxxxx.xxxxxx.xxxXxxxxx28.06.2023verifiedВысокий
4XXX.XX.XX.XXXXxxxxx22.07.2021verifiedВысокий
5XXX.XXX.XX.XXXxxxxx05.05.2022verifiedВысокий
6XXX.XXX.X.XXxxxx-xxxx-xxxx-xxx-xx-xxxx.xxxxxxxx.xxxXxxxxx22.07.2021verifiedВысокий
7XXX.XXX.XXX.XXXxxxxx28.04.2022verifiedВысокий
8XXX.XX.XXX.XXxxxxx.xxXxxxxx22.07.2021verifiedВысокий
9XXX.XX.XXX.XXXx-xxxx.x-xxxxxx.xxxXxxxxx05.05.2022verifiedВысокий

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueКлассУязвимостиВектор доступаТипУверенность
1T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveВысокий
2TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
3TXXXXCAPEC-CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
4TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveВысокий
5TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий

IOA - Indicator of Attack (6)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1File/cvms-hub/privado/seccionesmib/secciones.xhtmlpredictiveВысокий
2Filekbdint.cpredictiveСредний
3Filexxxxxxxxxxxx.xxxxpredictiveВысокий
4Filexxx-xxxx.xpredictiveСредний
5Filexxxxxxxxxxxxx.xxpredictiveВысокий
6Argumentx-xxxxpredictiveНизкий

Ссылки (6)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!