Lucifer Analys

IOB - Indicator of Behavior (28)

Tidslinje

Lang

en26
zh2

Land

cn20
us2

Skådespelare

Aktiviteter

Intressera

Tidslinje

Typ

Säljare

Produkt

SolarWinds SQL Sentry2
DZCP deV!L`z Clanportal2
Google Android2
JumpDEMAND 4ECPS Web Forms Plugin2
Apple watchOS2

Sårbarheter

#SårbarhetBaseTemp0dayI dagUtnRemCTIEPSSCVE
1Microsoft Windows NetBIOS WinNuke förnekande av tjänsten7.57.2$25k-$100k$0-$5kHighOfficial Fix0.030.00304CVE-1999-0153
2Oracle PeopleSoft Enterprise PeopleTools Integration Broker privilegier eskalering6.55.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.050.00799CVE-2017-3548
3ZyXEL NAS326/NAS540/NAS542 UDP Packet Format String9.89.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00417CVE-2022-34747
4MediaWiki cross site scripting4.34.3$0-$5kBeräknandeNot DefinedNot Defined0.000.00136CVE-2007-4883
5OpenSSH privilegier eskalering7.36.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000.02103CVE-2007-4752
6Dian Gemilang DGNews news.php sql injektion7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00188CVE-2007-2994
7PHP-Generics include.php privilegier eskalering7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.15334CVE-2007-2346
8JumpDEMAND 4ECPS Web Forms Plugin cross site scripting3.63.6$0-$5k$0-$5kNot DefinedNot Defined0.000.00048CVE-2022-44628
9Top Bar Plugin Setting cross site scripting2.42.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00056CVE-2022-2629
10Apple watchOS Audio File informationsgivning4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00109CVE-2020-29610
11Openscad STL File import_stl.cc import_stl minneskorruption6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00208CVE-2020-28599
12NVIDIA Jetson Linux Driver Package Cboot Module blob_decompress minneskorruption5.55.4$0-$5kBeräknandeNot DefinedOfficial Fix0.000.00042CVE-2022-28196
13Oracle Communications Pricing Design Center Python minneskorruption9.89.6$100k och mer$25k-$100kNot DefinedOfficial Fix0.000.04038CVE-2021-3177
14SolarWinds SQL Sentry informationsgivning4.64.6$0-$5k$0-$5kNot DefinedNot Defined0.000.00075CVE-2022-38107
15Google Android DevicePolicyManager informationsgivning3.33.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2022-20275
16Google Android Task.java Local Privilege Escalation6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00048CVE-2021-39696
17DZCP deV!L`z Clanportal config.php privilegier eskalering7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.380.00943CVE-2010-0966
18Elastic Enterprise Search App API Key privilegier eskalering5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00104CVE-2021-22149

Kampanjer (1)

These are the campaigns that can be associated with the actor:

  • CVE-2021-25646

IOC - Indicator of Compromise (14)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSårbarheterÅtkomstvektorTypFörtroende
1T1059CWE-94Argument InjectionpredictiveHög
2TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHög
3TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHög
4TXXXXCWE-XXXxx XxxxxxxxxpredictiveHög
5TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHög

IOA - Indicator of Attack (10)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlassIndicatorTypFörtroende
1Fileimport_stl.ccpredictiveHög
2Fileinc/config.phppredictiveHög
3Filexxxxxxx.xxxpredictiveMedium
4Filexxxx.xxxpredictiveMedium
5Filexxxx.xxxxpredictiveMedium
6ArgumentxxxxxxxxpredictiveMedium
7Argumentxxxx/xxxxpredictiveMedium
8ArgumentxxxxxxpredictiveLåg
9Argumentx-xxxxxxxxx-xxxpredictiveHög
10Argument_xxx_xxxxxxxx_xxxxpredictiveHög

Referenser (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!