WindShift Анализ

IOB - Indicator of Behavior (83)

Временная шкала

Язык

en76
pt4
pl2
zh2

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Microsoft Windows6
Backdoor.Win32.FTP.Lana.01.d2
Sophos Intercept X Endpoint2
Sophos Home2
Google Chrome2

Уязвимости

#УязвимостиBaseTemp0dayСегодняЭ�RemEPSSCTICVE
1Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.05CVE-2022-20818
2Cisco IOS XE Self-Healing эскалация привилегий7.37.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000420.06CVE-2022-20855
3Apple iOS ImageIO отказ в обслуживании6.46.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.035330.00CVE-2016-1811
4Acme Mini HTTPd Terminal эскалация привилегий5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.003030.04CVE-2009-4490
5Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-20775
6Apple iOS CommonCrypto раскрытие информации5.45.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.001810.00CVE-2016-1802
7Microsoft IIS межсайтовый скриптинг5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.05CVE-2017-0055
8Microsoft Word wwlib Remote Code Execution8.07.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.453520.00CVE-2023-21716
9Linux Kernel TPM Device повреждение памяти7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-2977
10D-Link Go-RT-AC750 gena.php эскалация привилегий7.67.6$5k-$25k$5k-$25kNot DefinedNot Defined0.001210.03CVE-2022-36523
11Multivendor Marketplace Solution for WooCommerce Order Status неизвестная уязвимость4.34.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.00CVE-2022-2657
12taviso Lotus 1-2-3 Worksheet process_fmt повреждение памяти7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000680.00CVE-2022-39843
13image-tiler эскалация привилегий8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001940.00CVE-2020-28451
14Apple macOS Kernel раскрытие информации3.33.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000620.00CVE-2022-32817
15Irfan Skiljan IrfanView ShowPlugInSaveOptions_W повреждение памяти5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000570.00CVE-2020-23561
16Microsoft Windows Defender Credential Guard Privilege Escalation8.37.3$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-34711
17Microsoft Windows Kerberos Privilege Escalation8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.001210.00CVE-2022-30165
18Microsoft Windows Kerberos AppContainer Privilege Escalation8.98.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-30164
19Microsoft Windows Network File System Remote Code Execution9.88.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.889090.04CVE-2022-30136
20Vmware Workspace ONE Access слабая аутентификация9.89.1$25k-$100k$0-$5kFunctionalOfficial Fix0.584830.00CVE-2022-22972

Кампании (1)

These are the campaigns that can be associated with the actor:

  • WindShift

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueКлассУязвимостиВектор доступаТипУверенность
1T1006CAPEC-126CWE-22, CWE-25Path TraversalpredictiveВысокий
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveВысокий
3T1059CAPEC-242CWE-94Argument InjectionpredictiveВысокий
4TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
5TXXXXCAPEC-122CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
6TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveВысокий
7TXXXXCAPEC-136CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveВысокий
8TXXXXCAPEC-108CWE-XX, CWE-XXXxx XxxxxxxxxpredictiveВысокий
9TXXXXCAPEC-466CWE-XXXXxxxxxx Xxxxxxxxxx Xx Xxx-xxxxxxxxpredictiveВысокий
10TXXXX.XXXCAPEC-CWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveВысокий
11TXXXXCAPEC-116CWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий
12TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveВысокий

IOA - Indicator of Attack (27)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1File.procmailrcpredictiveСредний
2File/cgi-bin/wapopenpredictiveВысокий
3File/htdocs/upnpinc/gena.phppredictiveВысокий
4File/it-IT/splunkd/__raw/services/get_snapshotpredictiveВысокий
5File/xxxxxxx/xxxxx/xxxxx.xxxpredictiveВысокий
6File/xxxxxxx/predictiveСредний
7Filexxxxx/xxxx/xxxxxxxxxxx/xxxxxxx.xpredictiveВысокий
8Filexxxx/xxxxxxxxxxxx.xxxpredictiveВысокий
9Filexxxxxxxx.xxxpredictiveСредний
10Filexxx.xxx?xxx=xxxxx_xxxxpredictiveВысокий
11Filexxxxxxxxxxxxxx/xxxxxxx.xxxpredictiveВысокий
12Filexxxxxxxx.xxxpredictiveСредний
13Filexx-xxxxxxxxxxx.xxxpredictiveВысокий
14File~/xx-xxxxxxxx.xxxpredictiveВысокий
15Argument$_xxxxxx['xxx_xxxx']predictiveВысокий
16Argument--xxxx=xxxpredictiveСредний
17ArgumentxxxxxxxxpredictiveСредний
18ArgumentxxxpredictiveНизкий
19ArgumentxxxxxxxxxxpredictiveСредний
20ArgumentxxxxxxxxpredictiveСредний
21ArgumentxxxxxpredictiveНизкий
22Argumentxxxxxx_xxpredictiveСредний
23Argumentxxxx_xxxxpredictiveСредний
24ArgumentxxxpredictiveНизкий
25ArgumentxxxpredictiveНизкий
26Argumentxxxxxxxx/xxxxpredictiveВысокий
27Input Value../..predictiveНизкий

Ссылки (3)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!