Hangover Анализ

IOB - Indicator of Behavior (89)

Временная шкала

Язык

en84
pt4
pl2

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Microsoft Windows8
Microsoft IIS4
Apple iOS4
SITEL CAP2
SITEL PRX2

Уязвимости

#УязвимостиBaseTemp0dayСегодняЭ�RemEPSSCTICVE
1Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2022-20818
2Cisco IOS XE Self-Healing эскалация привилегий7.37.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.000420.06CVE-2022-20855
3Apple iOS ImageIO отказ в обслуживании6.46.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.035330.00CVE-2016-1811
4Acme Mini HTTPd Terminal эскалация привилегий5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.003030.04CVE-2009-4490
5Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-20775
6Apple iOS CommonCrypto раскрытие информации5.45.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.001810.00CVE-2016-1802
7Microsoft IIS межсайтовый скриптинг5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.07CVE-2017-0055
8Microsoft Word wwlib Remote Code Execution8.07.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.453520.00CVE-2023-21716
9Linux Kernel TPM Device повреждение памяти7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-2977
10D-Link Go-RT-AC750 gena.php эскалация привилегий7.67.6$5k-$25k$5k-$25kNot DefinedNot Defined0.001210.03CVE-2022-36523
11Multivendor Marketplace Solution for WooCommerce Order Status неизвестная уязвимость4.34.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.00CVE-2022-2657
12taviso Lotus 1-2-3 Worksheet process_fmt повреждение памяти7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000680.00CVE-2022-39843
13image-tiler эскалация привилегий8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001940.00CVE-2020-28451
14Apple macOS Kernel раскрытие информации3.33.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000620.00CVE-2022-32817
15Irfan Skiljan IrfanView ShowPlugInSaveOptions_W повреждение памяти5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000570.00CVE-2020-23561
16Microsoft Windows Defender Credential Guard Privilege Escalation8.37.3$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-34711
17Microsoft Windows Kerberos Privilege Escalation8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.001210.00CVE-2022-30165
18Microsoft Windows Kerberos AppContainer Privilege Escalation8.98.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-30164
19Microsoft Windows Network File System Remote Code Execution9.88.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.889090.05CVE-2022-30136
20Vmware Workspace ONE Access слабая аутентификация9.89.1$25k-$100k$0-$5kFunctionalOfficial Fix0.584830.00CVE-2022-22972

Кампании (1)

These are the campaigns that can be associated with the actor:

  • WindShift

IOC - Indicator of Compromise (12)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueУязвимостиВектор доступаТипУверенность
1T1006CWE-22, CWE-25Path TraversalpredictiveВысокий
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveВысокий
3T1059CWE-94Argument InjectionpredictiveВысокий
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
5TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
6TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveВысокий
7TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveВысокий
8TXXXXCWE-XX, CWE-XXXxx XxxxxxxxxpredictiveВысокий
9TXXXXCWE-XXXXxxxxxx Xxxxxxxxxx Xx Xxx-xxxxxxxxpredictiveВысокий
10TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveВысокий
11TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий
12TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveВысокий

IOA - Indicator of Attack (29)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1File.procmailrcpredictiveСредний
2File/cgi-bin/wapopenpredictiveВысокий
3File/htdocs/upnpinc/gena.phppredictiveВысокий
4File/it-IT/splunkd/__raw/services/get_snapshotpredictiveВысокий
5File/xxxxxxx/xxxxx/xxxxx.xxxpredictiveВысокий
6File/xxxxxxx/predictiveСредний
7Filexxxxx/xxxx/xxxxxxxxxxx/xxxxxxx.xpredictiveВысокий
8Filexxxx/xxxxxxxxxxxx.xxxpredictiveВысокий
9Filexxxxxxxx.xxxpredictiveСредний
10Filexxx.xxx?xxx=xxxxx_xxxxpredictiveВысокий
11Filexxxxxxxxxxxxxx/xxxxxxx.xxxpredictiveВысокий
12Filexx_xxxxxxx_xxxxxxx.xxxpredictiveВысокий
13Filexxxxxxxx.xxxpredictiveСредний
14Filexx-xxxxxxxxxxx.xxxpredictiveВысокий
15File~/xx-xxxxxxxx.xxxpredictiveВысокий
16Argument$_xxxxxx['xxx_xxxx']predictiveВысокий
17Argument--xxxx=xxxpredictiveСредний
18ArgumentxxxxxxxxpredictiveСредний
19ArgumentxxxpredictiveНизкий
20ArgumentxxxxxxxxxxpredictiveСредний
21ArgumentxxxxxxxxpredictiveСредний
22ArgumentxxxxxxxxpredictiveСредний
23ArgumentxxxxxpredictiveНизкий
24Argumentxxxxxx_xxpredictiveСредний
25Argumentxxxx_xxxxpredictiveСредний
26ArgumentxxxpredictiveНизкий
27ArgumentxxxpredictiveНизкий
28Argumentxxxxxxxx/xxxxpredictiveВысокий
29Input Value../..predictiveНизкий

Ссылки (3)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!