Mushtik Analys

IOB - Indicator of Behavior (13)

Tidslinje

Lang

en14

Land

Skådespelare

Aktiviteter

Intressera

Tidslinje

Typ

Säljare

Produkt

Apple iOS6
Apple iPadOS4
Facebook react-dev-utils2
WordPress2
Cisco IOS2

Sårbarheter

#SårbarhetBaseTemp0dayI dagUtnRemCTIEPSSCVE
1Cisco IOS/IOS XE QoS minneskorruption8.58.3$25k-$100k$5k-$25kNot DefinedWorkaround0.030.03537CVE-2018-0151
2BEA WebLogic Domain Directory okänd sårbarhet8.27.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000.00505CVE-2006-2546
3Facebook react-dev-utils getProcessForPort privilegier eskalering5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00241CVE-2021-24033
4Apple Safari Address privilegier eskalering5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00084CVE-2019-8670
5Docker Docker Image Manifest förnekande av tjänsten4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00553CVE-2021-21285
6Apple iOS/iPadOS WebKit Remote Code Execution6.36.0$100k och mer$5k-$25kHighOfficial Fix0.000.00980CVE-2021-1870
7CSI snapshot-controller Volume Snapshot förnekande av tjänsten5.45.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00066CVE-2020-8569
8Kubernetes API Server privilegier eskalering4.04.0$0-$5k$0-$5kNot DefinedNot Defined0.000.00238CVE-2020-8554
9Apple iOS/iPadOS XPC Service launchd privilegier eskalering7.87.0$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000.00077CVE-2020-9971
10Apple iOS/iPadOS WebRTC minneskorruption7.57.2$100k och mer$5k-$25kNot DefinedOfficial Fix0.000.00833CVE-2020-15969
11Apple iOS/iPadOS Address Bar privilegier eskalering4.34.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00101CVE-2020-9993
12WordPress admin-ajax.php sql injektion7.37.3$25k-$100k$0-$5kHighOfficial Fix0.020.05147CVE-2007-2821
13Apple iOS Disk Images minneskorruption6.56.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00237CVE-2016-7616

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-adressHostnameSkådespelareKampanjerIdentifiedTypFörtroende
118.228.7.109ec2-18-228-7-109.sa-east-1.compute.amazonaws.comMushtik13/07/2022verifiedMedium
2XXX.XXX.XXX.XXXXxxxxxx13/07/2022verifiedHög

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSårbarheterÅtkomstvektorTypFörtroende
1T1068CWE-264Execution with Unnecessary PrivilegespredictiveHög
2TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHög
3TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHög
4TXXXXCWE-XXXxx XxxxxxxxxpredictiveHög
5TXXXX.XXXCWE-XXXXxxxxxxxxxxxpredictiveHög

IOA - Indicator of Attack (4)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlassIndicatorTypFörtroende
1Fileadmin-ajax.phppredictiveHög
2FilexxxxxxxpredictiveLåg
3ArgumentxxxxxxpredictiveLåg
4Network Portxxx/xxxxxpredictiveMedium

Referenser (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!