Tonto Team Анализ

IOB - Indicator of Behavior (53)

Временная шкала

Язык

en40
zh14

Страна

cn38
us16

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Microsoft Exchange Server6
Palo Alto PAN-OS4
Matomo2
Netgate pfSense2
Barracuda Networks Barracuda Spam Firewall2

Уязвимости

#УязвимостиBaseTemp0dayСегодняЭ�RemCTIEPSSCVE
1DaSchTour matomo-mediawiki-extension Username Piwik.hooks.php межсайтовый скриптинг3.83.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.130.00094CVE-2017-20175
2Apache HTTP Server server-status раскрытие информации5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.000.00000
3Juniper Junos JDHCPD раскрытие информации7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00103CVE-2020-1671
4SonicWall SSLVPN SMA100 sql-инъекция7.37.1$0-$5k$0-$5kFunctionalNot Defined0.000.02628CVE-2021-20016
5LangChain Configuration load_chain обход каталога5.04.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.080.00045CVE-2024-28088
6Cisco IOS XE Linux Shell эскалация привилегий8.07.7$25k-$100k$5k-$25kNot DefinedOfficial Fix0.020.00164CVE-2020-3218
7Tmax Soft JEUS Web Application Server url.jsp межсайтовый скриптинг4.34.1$0-$5k$0-$5kHighOfficial Fix0.020.00000
8Revive Adserver раскрытие информации5.65.6$0-$5k$0-$5kNot DefinedNot Defined0.000.00100CVE-2023-26756
9Microsoft Exchange Server Privilege Escalation8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.030.01502CVE-2022-23277
10Microsoft Exchange Server PowerShell ProxyNotShell Privilege Escalation7.77.3$5k-$25k$0-$5kHighOfficial Fix0.030.11506CVE-2022-41082
11Microsoft Exchange Server раскрытие информации9.88.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.040.00333CVE-2023-21709
12OMICARD EDM обход каталога6.46.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00186CVE-2022-32963
13HPE System Management Homepage эскалация привилегий6.56.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2017-12547
14Aruba Networks ArubaOS-CX Switches Recovery Console слабая аутентификация6.56.5$5k-$25k$5k-$25kNot DefinedNot Defined0.040.00060CVE-2022-23691
15Netgear Prosafe Switch /filesystem/ Script отказ в обслуживании5.35.0$5k-$25k$0-$5kProof-of-ConceptNot Defined0.020.96771CVE-2013-4776
16Microsoft Exchange Server Privilege Escalation8.07.3$5k-$25k$5k-$25kUnprovenOfficial Fix0.040.00095CVE-2023-28310
17Microsoft Windows win32k.sys эскалация привилегий7.37.0$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.040.49900CVE-2014-4148
18Dreamer CMS File Upload межсайтовый скриптинг4.14.1$0-$5k$0-$5kNot DefinedNot Defined0.090.00082CVE-2023-1746
19Netgate pfSense XML File config.xml restore_rrddata эскалация привилегий5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.010.45928CVE-2023-27253
20Boa Webserver GET wapopen обход каталога6.46.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.090.73540CVE-2017-9833

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-адресHostnameАкторКампанииIdentifiedТипУверенность
145.133.194.135Tonto Team18.03.2024verifiedВысокий
2XX.XX.XXX.XXXxxxx Xxxx11.06.2021verifiedВысокий

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueУязвимостиВектор доступаТипУверенность
1T1006CWE-22Path TraversalpredictiveВысокий
2T1059CWE-94Argument InjectionpredictiveВысокий
3TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
4TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
5TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveВысокий
6TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveВысокий
7TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveВысокий
8TXXXXCWE-XXXxx XxxxxxxxxpredictiveВысокий
9TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1File/cgi-bin/wapopenpredictiveВысокий
2File/server-statuspredictiveВысокий
3File/webmail/predictiveСредний
4Filexxxxxx.xxxpredictiveСредний
5Filexxxxxxx_xxxx.xxxx.xxx/xxxxxxx_xxxx.xxxpredictiveВысокий
6Filexxxxxxxxxx/predictiveСредний
7Filexxx.xxpredictiveНизкий
8Filexxxxx.xxxxx.xxxpredictiveВысокий
9Filexxxxxxx/xxxxxxxxxxxxxxxx/xxxxxxxxx/xxxxxxxx.xxxxpredictiveВысокий
10Filexxxxxxxxx/xx/xx/xxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxpredictiveВысокий
11Filexxx.xxxpredictiveНизкий
12Filexxx/xxxxx.xxxpredictiveВысокий
13Filexxx_xxxxxxxx.xxxpredictiveВысокий
14Libraryxxxxxx.xxxpredictiveСредний
15Argument$_xxxxxx['xxxx_xxxx_xxxxx']predictiveВысокий
16ArgumentxxxxxxxxxxxxxxpredictiveВысокий
17ArgumentxxxxxxxxxxpredictiveСредний
18ArgumentxxxpredictiveНизкий
19ArgumentxxxxpredictiveНизкий
20ArgumentxxxxxxxpredictiveНизкий
21ArgumentxxxxxxxxpredictiveСредний
22Input Value../..predictiveНизкий

Ссылки (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!