Packrat Анализ

IOB - Indicator of Behavior (85)

Временная шкала

Язык

en66
pt14
es6

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Google Android6
Microsoft Office4
Sun Solaris4
Dropbear SSH4
Linux Kernel4

Уязвимости

#УязвимостиBaseTemp0dayСегодняЭ�RemEPSSCTICVE
1Dropbear SSH эскалация привилегий8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.029110.00CVE-2016-7406
2OpenSSL Non-prime Moduli BN_mod_sqrt отказ в обслуживании6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.013420.00CVE-2022-0778
3VMware ESXi Host Client Stored межсайтовый скриптинг5.24.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000760.00CVE-2017-4940
4HP Integrated Lights-Out IPMI Protocol эскалация привилегий8.28.0$5k-$25k$0-$5kHighWorkaround0.271960.09CVE-2013-4786
5Apache HTTP Server mod_reqtimeout отказ в обслуживании5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.016960.05CVE-2007-6750
6Linux Kernel Socket Buffer virtio_bt.c отказ в обслуживании5.75.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.02CVE-2022-26878
7Microsoft Windows LSA раскрытие информации6.46.0$25k-$100k$5k-$25kHighOfficial Fix0.852870.06CVE-2021-36942
8Dropbear SSH dbclient/server Memory раскрытие информации4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.01CVE-2016-7409
9Dropbear SSH dropbearconvert эскалация привилегий8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009560.02CVE-2016-7407
10phpMyAdmin grab_globals.lib.php обход каталога4.84.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.023340.32CVE-2005-3299
11Ietf MD5 слабое шифрование5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.012240.00CVE-2004-2761
12Sun Solaris Authentication слабая аутентификация9.89.6$5k-$25k$0-$5kHighWorkaround0.012970.00CVE-1999-0502
13TP-LINK TL-WR840N повреждение памяти5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.000920.00CVE-2022-26642
14HP Intelligent Management Center tftpserver.exe эскалация привилегий10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.057500.00CVE-2011-1853
15Microsoft Windows SMB Processor EducatedScholar отказ в обслуживании7.37.0$5k-$25k$0-$5kHighOfficial Fix0.972660.06CVE-2009-3103
16avahi socket.c отказ в обслуживании5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.075140.00CVE-2011-1002
17OpenSSL EC раскрытие информации3.13.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.003860.00CVE-2021-4160
18Linux Kernel KVM эскалация привилегий7.67.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000560.03CVE-2021-3653
19Fortinet FortiMail обход каталога6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000930.00CVE-2021-24013
20Fortinet FortiMail Identity-Based Encryption Service слабое шифрование4.03.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000600.00CVE-2021-26099

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueКлассУязвимостиВектор доступаТипУверенность
1T1006CAPEC-126CWE-22Path TraversalpredictiveВысокий
2T1059CAPEC-242CWE-94Argument InjectionpredictiveВысокий
3TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
4TXXXXCAPEC-19CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
5TXXXXCAPEC-0CWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveВысокий
6TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveВысокий
7TXXXXCAPEC-0CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
8TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий
9TXXXXCAPEC-157CWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveВысокий

IOA - Indicator of Attack (20)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1Fileapi/sms_check.phppredictiveВысокий
2Fileavahi-core/socket.cpredictiveВысокий
3Filechmextract.cpredictiveСредний
4Filexxxxxxx/xxxxxxxxx/xxxxxx_xx.xpredictiveВысокий
5Filexxxx_xxxxxxx.xxx.xxxpredictiveВысокий
6Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveВысокий
7Filexxxxx.xxxpredictiveСредний
8Filexxxxxx_xxx.xpredictiveСредний
9Filexxxxx-xxx.xpredictiveСредний
10Filexxxxxxxxxx.xxxpredictiveВысокий
11Libraryxxxxxxxx.xxxpredictiveСредний
12Argument-xpredictiveНизкий
13ArgumentxxxxpredictiveНизкий
14Argumentxxx_xxxpredictiveНизкий
15ArgumentxxxxxpredictiveНизкий
16ArgumentxxxxxxxxpredictiveСредний
17ArgumentxxxxxxxxpredictiveСредний
18ArgumentxxxxpredictiveНизкий
19Argumentxxxxxxxx/xxxxpredictiveВысокий
20Argumentx_xx_xxxxxxxxxxxxxxxxpredictiveВысокий

Ссылки (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!