Update
This commit is contained in:
parent
d8bfb92c48
commit
d181d02f63
|
@ -30,7 +30,7 @@ There are 4 more IOC items available. Please use our online service to access th
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT-C-01_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT-C-01_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 20 more country items available. Please use our online service to access the data.
|
||||
There are 21 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -30,7 +30,7 @@ There are 5 more IOC items available. Please use our online service to access th
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT-C-36_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT-C-36_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -49,8 +49,8 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `$SPLUNK_HOME/etc/splunk-launch.conf` | High
|
||||
2 | File | `/+CSCOE+/logon.html` | High
|
||||
3 | File | `/admin/model/database.class.php` | High
|
||||
4 | File | `/assets/ctx` | Medium
|
||||
3 | File | `/assets/ctx` | Medium
|
||||
4 | File | `/cloud_config/router_post/check_reg_verify_code` | High
|
||||
5 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
6 | File | `/config/getuser` | High
|
||||
7 | File | `/debug/pprof` | Medium
|
||||
|
@ -58,13 +58,13 @@ ID | Type | Indicator | Confidence
|
|||
9 | File | `/filemanager/php/connector.php` | High
|
||||
10 | File | `/get_getnetworkconf.cgi` | High
|
||||
11 | File | `/HNAP1` | Low
|
||||
12 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
|
||||
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
14 | File | `/modx/manager/index.php` | High
|
||||
15 | File | `/osm/REGISTER.cmd` | High
|
||||
16 | File | `/product_list.php` | High
|
||||
17 | File | `/replication` | Medium
|
||||
18 | File | `/see_more_details.php` | High
|
||||
12 | File | `/include/chart_generator.php` | High
|
||||
13 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
|
||||
14 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
15 | File | `/modx/manager/index.php` | High
|
||||
16 | File | `/osm/REGISTER.cmd` | High
|
||||
17 | File | `/product_list.php` | High
|
||||
18 | File | `/replication` | Medium
|
||||
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
20 | File | `/supervisor/procesa_carga.php` | High
|
||||
21 | File | `/type.php` | Medium
|
||||
|
@ -82,34 +82,32 @@ ID | Type | Indicator | Confidence
|
|||
33 | File | `admin.joomlaradiov5.php` | High
|
||||
34 | File | `admin.php` | Medium
|
||||
35 | File | `admin.php?m=Food&a=addsave` | High
|
||||
36 | File | `admin/category.inc.php` | High
|
||||
37 | File | `admin/conf_users_edit.php` | High
|
||||
38 | File | `admin/index.php` | High
|
||||
39 | File | `admin/user.php` | High
|
||||
40 | File | `admin/write-post.php` | High
|
||||
41 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
42 | File | `admin_events.php` | High
|
||||
43 | File | `ajax_new_account.php` | High
|
||||
44 | File | `akocomments.php` | High
|
||||
45 | File | `allopass-error.php` | High
|
||||
46 | File | `announcement.php` | High
|
||||
47 | File | `api_poller.php` | High
|
||||
48 | File | `apply.cgi` | Medium
|
||||
49 | File | `archiver\index.php` | High
|
||||
50 | File | `artlinks.dispnew.php` | High
|
||||
51 | File | `auth.inc.php` | Medium
|
||||
52 | File | `authorization.do` | High
|
||||
53 | File | `awstats.pl` | Medium
|
||||
54 | File | `backoffice/login.asp` | High
|
||||
55 | File | `bb_usage_stats.php` | High
|
||||
56 | File | `binder.c` | Medium
|
||||
57 | File | `bl-kernel/ajax/upload-images.php` | High
|
||||
58 | File | `books.php` | Medium
|
||||
59 | File | `C:\Python27` | Medium
|
||||
60 | File | `C:\Windows\System32\config\SAM` | High
|
||||
61 | ... | ... | ...
|
||||
36 | File | `admin/conf_users_edit.php` | High
|
||||
37 | File | `admin/index.php` | High
|
||||
38 | File | `admin/user.php` | High
|
||||
39 | File | `admin/write-post.php` | High
|
||||
40 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
41 | File | `admin_events.php` | High
|
||||
42 | File | `ajax_new_account.php` | High
|
||||
43 | File | `akocomments.php` | High
|
||||
44 | File | `allopass-error.php` | High
|
||||
45 | File | `announcement.php` | High
|
||||
46 | File | `apply.cgi` | Medium
|
||||
47 | File | `archiver\index.php` | High
|
||||
48 | File | `artlinks.dispnew.php` | High
|
||||
49 | File | `auth.inc.php` | Medium
|
||||
50 | File | `authorization.do` | High
|
||||
51 | File | `awstats.pl` | Medium
|
||||
52 | File | `backoffice/login.asp` | High
|
||||
53 | File | `bb_usage_stats.php` | High
|
||||
54 | File | `binder.c` | Medium
|
||||
55 | File | `bl-kernel/ajax/upload-images.php` | High
|
||||
56 | File | `books.php` | Medium
|
||||
57 | File | `C:\Python27` | Medium
|
||||
58 | File | `C:\Windows\System32\config\SAM` | High
|
||||
59 | ... | ... | ...
|
||||
|
||||
There are 530 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 517 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -18,7 +18,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [CH](https://vuldb.com/?country.ch)
|
||||
* ...
|
||||
|
||||
There are 9 more country items available. Please use our online service to access the data.
|
||||
|
@ -105,11 +105,11 @@ ID | Type | Indicator | Confidence
|
|||
27 | File | `ajax_udf.php` | Medium
|
||||
28 | File | `AppCompatCache.exe` | High
|
||||
29 | File | `application.js.php` | High
|
||||
30 | File | `apply.cgi` | Medium
|
||||
31 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
30 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
31 | File | `authenticate.c` | High
|
||||
32 | ... | ... | ...
|
||||
|
||||
There are 271 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 273 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# APT12 - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT12](https://vuldb.com/?actor.apt12). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT12](https://vuldb.com/?actor.apt12). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt12](https://vuldb.com/?actor.apt12)
|
||||
|
||||
|
@ -14,9 +14,9 @@ The following _campaigns_ are known and can be associated with APT12:
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT12:
|
||||
|
||||
* ES
|
||||
* AR
|
||||
* US
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* [AR](https://vuldb.com/?country.ar)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -24,21 +24,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 32.114.251.129 | - | Etumbot | High
|
||||
2 | 59.0.249.11 | - | Etumbot | High
|
||||
3 | 92.54.232.142 | - | Etumbot | High
|
||||
1 | [32.114.251.129](https://vuldb.com/?ip.32.114.251.129) | - | Etumbot | High
|
||||
2 | [59.0.249.11](https://vuldb.com/?ip.59.0.249.11) | - | Etumbot | High
|
||||
3 | [92.54.232.142](https://vuldb.com/?ip.92.54.232.142) | - | Etumbot | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 14 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT12. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT12_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1499 | CWE-404 | Resource Consumption | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -21,7 +21,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT16. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT16_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -37,7 +37,7 @@ There are 17 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT17_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT17_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,44 +1,44 @@
|
|||
# APT19 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT19](https://vuldb.com/?actor.apt19). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT19](https://vuldb.com/?actor.apt19). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt19](https://vuldb.com/?actor.apt19)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt19](https://vuldb.com/?actor.apt19)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with APT19:
|
||||
The following _campaigns_ are known and can be associated with APT19:
|
||||
|
||||
* c0d0s0
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT19:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT19:
|
||||
|
||||
* CN
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT19.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT19.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 42.200.18.194 | - | High
|
||||
2 | 104.236.77.169 | - | High
|
||||
3 | 121.54.168.230 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [42.200.18.194](https://vuldb.com/?ip.42.200.18.194) | - | c0d0s0 | High
|
||||
2 | [104.236.77.169](https://vuldb.com/?ip.104.236.77.169) | - | - | High
|
||||
3 | [121.54.168.230](https://vuldb.com/?ip.121.54.168.230) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/new-attacks-linked-to-c0d0s0-group/
|
||||
* https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -38,7 +38,7 @@ There are 34 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT2. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT2_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -47,7 +47,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -31,13 +31,18 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
2 | [34.93.247.126](https://vuldb.com/?ip.34.93.247.126) | 126.247.93.34.bc.googleusercontent.com | SysUpdate | Medium
|
||||
3 | [35.187.148.253](https://vuldb.com/?ip.35.187.148.253) | 253.148.187.35.bc.googleusercontent.com | SysUpdate | Medium
|
||||
4 | [35.220.135.85](https://vuldb.com/?ip.35.220.135.85) | 85.135.220.35.bc.googleusercontent.com | SysUpdate | Medium
|
||||
5 | ... | ... | ... | ...
|
||||
5 | [45.77.250.141](https://vuldb.com/?ip.45.77.250.141) | 45.77.250.141.vultr.com | - | Medium
|
||||
6 | [45.142.214.188](https://vuldb.com/?ip.45.142.214.188) | vm309132.pq.hosting | SysUpdate | High
|
||||
7 | [47.75.49.32](https://vuldb.com/?ip.47.75.49.32) | - | SysUpdate | High
|
||||
8 | [49.143.192.221](https://vuldb.com/?ip.49.143.192.221) | - | - | High
|
||||
9 | [49.143.205.30](https://vuldb.com/?ip.49.143.205.30) | - | - | High
|
||||
10 | ... | ... | ... | ...
|
||||
|
||||
There are 16 more IOC items available. Please use our online service to access the data.
|
||||
There are 35 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT27. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT27_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -46,7 +51,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -56,28 +61,43 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/+CSCOE+/logon.html` | High
|
||||
2 | File | `/cgi-bin/live_api.cgi` | High
|
||||
3 | File | `/config/getuser` | High
|
||||
4 | File | `/etc/shadow` | Medium
|
||||
5 | File | `/infusions/shoutbox_panel/shoutbox_admin.php` | High
|
||||
6 | File | `/oscommerce/admin/currencies.php` | High
|
||||
7 | File | `/proc/pid/syscall` | High
|
||||
8 | File | `/rapi/read_url` | High
|
||||
9 | File | `/session/list/allActiveSession` | High
|
||||
10 | File | `/syslog_rules` | High
|
||||
11 | File | `/uncpath/` | Medium
|
||||
12 | File | `/upload` | Low
|
||||
13 | File | `/users/{id}` | Medium
|
||||
14 | File | `/video` | Low
|
||||
15 | File | `ActivityManagerService.java` | High
|
||||
16 | File | `adaptmap_reg.c` | High
|
||||
17 | File | `admin.cgi` | Medium
|
||||
18 | File | `admin.php` | Medium
|
||||
19 | File | `admin.php?action=files` | High
|
||||
20 | File | `admin/modules/master_file/rda_cmc.php?keywords` | High
|
||||
21 | File | `album_portal.php` | High
|
||||
22 | ... | ... | ...
|
||||
3 | File | `/cgi-bin/wapopen` | High
|
||||
4 | File | `/config/getuser` | High
|
||||
5 | File | `/etc/ajenti/config.yml` | High
|
||||
6 | File | `/etc/shadow` | Medium
|
||||
7 | File | `/goform/telnet` | High
|
||||
8 | File | `/infusions/shoutbox_panel/shoutbox_admin.php` | High
|
||||
9 | File | `/modules/profile/index.php` | High
|
||||
10 | File | `/oscommerce/admin/currencies.php` | High
|
||||
11 | File | `/proc/pid/syscall` | High
|
||||
12 | File | `/rapi/read_url` | High
|
||||
13 | File | `/rom-0` | Low
|
||||
14 | File | `/session/list/allActiveSession` | High
|
||||
15 | File | `/syslog_rules` | High
|
||||
16 | File | `/tmp/phpglibccheck` | High
|
||||
17 | File | `/uncpath/` | Medium
|
||||
18 | File | `/upload` | Low
|
||||
19 | File | `/users/{id}` | Medium
|
||||
20 | File | `/var/tmp/sess_*` | High
|
||||
21 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
|
||||
22 | File | `/video` | Low
|
||||
23 | File | `actionphp/download.File.php` | High
|
||||
24 | File | `ActivityManagerService.java` | High
|
||||
25 | File | `adaptmap_reg.c` | High
|
||||
26 | File | `add_comment.php` | High
|
||||
27 | File | `admin.cgi` | Medium
|
||||
28 | File | `admin.php` | Medium
|
||||
29 | File | `admin.php?action=files` | High
|
||||
30 | File | `admin/admin.php` | High
|
||||
31 | File | `admin/content.php` | High
|
||||
32 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
|
||||
33 | File | `admin/modules/master_file/rda_cmc.php?keywords` | High
|
||||
34 | File | `affich.php` | Medium
|
||||
35 | File | `agent/Core/Controller/SendRequest.cpp` | High
|
||||
36 | File | `album_portal.php` | High
|
||||
37 | ... | ... | ...
|
||||
|
||||
There are 187 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 321 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -86,6 +106,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://github.com/hvs-consulting/ioc_signatures/blob/main/Emissary_Panda_APT27/HvS_APT27_2021-10_IOCs.csv
|
||||
* https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.04.09/Iron%20Tiger.pdf
|
||||
* https://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage
|
||||
* https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -104,39 +104,38 @@ ID | Type | Indicator | Confidence
|
|||
1 | File | `.travis.yml` | Medium
|
||||
2 | File | `/.env` | Low
|
||||
3 | File | `/admin.php` | Medium
|
||||
4 | File | `/admin/config.php?display=disa&view=form` | High
|
||||
5 | File | `/category_view.php` | High
|
||||
6 | File | `/dev/kmem` | Medium
|
||||
7 | File | `/file?action=download&file` | High
|
||||
8 | File | `/filemanager/upload.php` | High
|
||||
9 | File | `/medical/inventories.php` | High
|
||||
10 | File | `/monitoring` | Medium
|
||||
11 | File | `/NAGErrors` | Medium
|
||||
12 | File | `/plugins/servlet/audit/resource` | High
|
||||
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
14 | File | `/REBOOTSYSTEM` | High
|
||||
15 | File | `/replication` | Medium
|
||||
16 | File | `/reports/rwservlet` | High
|
||||
17 | File | `/RestAPI` | Medium
|
||||
18 | File | `/tmp` | Low
|
||||
19 | File | `/tmp/speedtest_urls.xml` | High
|
||||
20 | File | `/uncpath/` | Medium
|
||||
21 | File | `/var/log/nginx` | High
|
||||
22 | File | `/wp-admin/admin.php` | High
|
||||
23 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
24 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
25 | File | `admin/app/mediamanager` | High
|
||||
26 | File | `admin/index.php` | High
|
||||
27 | File | `admin\model\catalog\download.php` | High
|
||||
28 | File | `afr.php` | Low
|
||||
29 | File | `apcupsd.pid` | Medium
|
||||
30 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
|
||||
31 | File | `api/sms/send-sms` | High
|
||||
32 | File | `api/v1/alarms` | High
|
||||
33 | File | `application/controller/InstallerController.php` | High
|
||||
34 | ... | ... | ...
|
||||
4 | File | `/category_view.php` | High
|
||||
5 | File | `/dev/kmem` | Medium
|
||||
6 | File | `/file?action=download&file` | High
|
||||
7 | File | `/filemanager/upload.php` | High
|
||||
8 | File | `/medical/inventories.php` | High
|
||||
9 | File | `/monitoring` | Medium
|
||||
10 | File | `/NAGErrors` | Medium
|
||||
11 | File | `/plugins/servlet/audit/resource` | High
|
||||
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
13 | File | `/REBOOTSYSTEM` | High
|
||||
14 | File | `/replication` | Medium
|
||||
15 | File | `/reports/rwservlet` | High
|
||||
16 | File | `/RestAPI` | Medium
|
||||
17 | File | `/tmp` | Low
|
||||
18 | File | `/tmp/speedtest_urls.xml` | High
|
||||
19 | File | `/uncpath/` | Medium
|
||||
20 | File | `/var/log/nginx` | High
|
||||
21 | File | `/wp-admin/admin.php` | High
|
||||
22 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
23 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
24 | File | `admin/app/mediamanager` | High
|
||||
25 | File | `admin/index.php` | High
|
||||
26 | File | `admin\model\catalog\download.php` | High
|
||||
27 | File | `afr.php` | Low
|
||||
28 | File | `apcupsd.pid` | Medium
|
||||
29 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
|
||||
30 | File | `api/sms/send-sms` | High
|
||||
31 | File | `api/v1/alarms` | High
|
||||
32 | File | `application/controller/InstallerController.php` | High
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 284 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -90,32 +90,32 @@ ID | Type | Indicator | Confidence
|
|||
12 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
13 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
|
||||
14 | File | `/dcim/sites/add/` | High
|
||||
15 | File | `/EXCU_SHELL` | Medium
|
||||
16 | File | `/fudforum/adm/hlplist.php` | High
|
||||
17 | File | `/login` | Low
|
||||
18 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
19 | File | `/monitoring` | Medium
|
||||
20 | File | `/ms/cms/content/list.do` | High
|
||||
21 | File | `/new` | Low
|
||||
22 | File | `/orms/` | Low
|
||||
23 | File | `/proc/<pid>/status` | High
|
||||
24 | File | `/public/plugins/` | High
|
||||
25 | File | `/rom` | Low
|
||||
26 | File | `/scripts/killpvhost` | High
|
||||
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
28 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
29 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
30 | File | `/tmp` | Low
|
||||
31 | File | `/tmp/redis.ds` | High
|
||||
32 | File | `/uncpath/` | Medium
|
||||
33 | File | `/wp-admin` | Medium
|
||||
34 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
35 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
36 | File | `ABuffer.cpp` | Medium
|
||||
37 | File | `AccountManagerService.java` | High
|
||||
15 | File | `/fudforum/adm/hlplist.php` | High
|
||||
16 | File | `/login` | Low
|
||||
17 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
18 | File | `/monitoring` | Medium
|
||||
19 | File | `/ms/cms/content/list.do` | High
|
||||
20 | File | `/new` | Low
|
||||
21 | File | `/orms/` | Low
|
||||
22 | File | `/proc/<pid>/status` | High
|
||||
23 | File | `/public/plugins/` | High
|
||||
24 | File | `/rom` | Low
|
||||
25 | File | `/scripts/killpvhost` | High
|
||||
26 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
27 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
28 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
29 | File | `/tmp` | Low
|
||||
30 | File | `/tmp/redis.ds` | High
|
||||
31 | File | `/uncpath/` | Medium
|
||||
32 | File | `/wp-admin` | Medium
|
||||
33 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
34 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
35 | File | `ABuffer.cpp` | Medium
|
||||
36 | File | `AccountManagerService.java` | High
|
||||
37 | File | `actions/CompanyDetailsSave.php` | High
|
||||
38 | ... | ... | ...
|
||||
|
||||
There are 328 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 330 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -76,34 +76,34 @@ ID | Type | Indicator | Confidence
|
|||
20 | File | `/password.html` | High
|
||||
21 | File | `/proc/ioports` | High
|
||||
22 | File | `/property-list/property_view.php` | High
|
||||
23 | File | `/rest` | Low
|
||||
24 | File | `/rest/api/2/search` | High
|
||||
25 | File | `/s/` | Low
|
||||
26 | File | `/scripts/cpan_config` | High
|
||||
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
28 | File | `/services/system/setup.json` | High
|
||||
29 | File | `/uncpath/` | Medium
|
||||
30 | File | `/webconsole/APIController` | High
|
||||
31 | File | `/websocket/exec` | High
|
||||
32 | File | `/wp-admin/admin-ajax.php` | High
|
||||
33 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
34 | File | `/_next` | Low
|
||||
35 | File | `4.edu.php\conn\function.php` | High
|
||||
36 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
37 | File | `adclick.php` | Medium
|
||||
38 | File | `addentry.php` | Medium
|
||||
39 | File | `addressbook.php` | High
|
||||
40 | File | `add_comment.php` | High
|
||||
41 | File | `admin/category.inc.php` | High
|
||||
42 | File | `admin/conf_users_edit.php` | High
|
||||
43 | File | `admin/dl_sendmail.php` | High
|
||||
44 | File | `admin/index.php` | High
|
||||
45 | File | `admin/languages.php` | High
|
||||
46 | File | `admin/password_forgotten.php` | High
|
||||
47 | File | `admin/versions.html` | High
|
||||
23 | File | `/ptms/classes/Users.php` | High
|
||||
24 | File | `/rest` | Low
|
||||
25 | File | `/rest/api/2/search` | High
|
||||
26 | File | `/s/` | Low
|
||||
27 | File | `/scripts/cpan_config` | High
|
||||
28 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
29 | File | `/services/system/setup.json` | High
|
||||
30 | File | `/uncpath/` | Medium
|
||||
31 | File | `/webconsole/APIController` | High
|
||||
32 | File | `/websocket/exec` | High
|
||||
33 | File | `/wp-admin/admin-ajax.php` | High
|
||||
34 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
35 | File | `/_next` | Low
|
||||
36 | File | `4.edu.php\conn\function.php` | High
|
||||
37 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
38 | File | `adclick.php` | Medium
|
||||
39 | File | `addentry.php` | Medium
|
||||
40 | File | `addressbook.php` | High
|
||||
41 | File | `add_comment.php` | High
|
||||
42 | File | `admin/category.inc.php` | High
|
||||
43 | File | `admin/conf_users_edit.php` | High
|
||||
44 | File | `admin/dl_sendmail.php` | High
|
||||
45 | File | `admin/index.php` | High
|
||||
46 | File | `admin/languages.php` | High
|
||||
47 | File | `admin/password_forgotten.php` | High
|
||||
48 | ... | ... | ...
|
||||
|
||||
There are 412 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 414 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,28 +1,28 @@
|
|||
# APT30 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT30](https://vuldb.com/?actor.apt30). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT30](https://vuldb.com/?actor.apt30). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt30](https://vuldb.com/?actor.apt30)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt30](https://vuldb.com/?actor.apt30)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT30.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT30.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.1.0.29 | 5-1-0-29.datagroup.ua | High
|
||||
2 | 112.117.9.222 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.1.0.29](https://vuldb.com/?ip.5.1.0.29) | 5-1-0-29.datagroup.ua | - | High
|
||||
2 | [112.117.9.222](https://vuldb.com/?ip.112.117.9.222) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=rpt-apt30.pdf&y=2015
|
||||
* https://www.threatminer.org/_reports/2015/rpt-apt30.pdf#viewer.action=download
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -87,7 +87,7 @@ ID | Type | Indicator | Confidence
|
|||
22 | File | `asm/float.c` | Medium
|
||||
23 | ... | ... | ...
|
||||
|
||||
There are 188 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 189 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -21,7 +21,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
There are 7 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -54,12 +54,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -69,31 +69,33 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin.add` | Medium
|
||||
3 | File | `/admin/?page=user/manage_user` | High
|
||||
4 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
|
||||
5 | File | `/admin/customers.php?page=1&cID` | High
|
||||
6 | File | `/admin/edit_user.php` | High
|
||||
7 | File | `/admin/files` | Medium
|
||||
8 | File | `/admin/login.php` | High
|
||||
9 | File | `/administrator/components/menu/` | High
|
||||
10 | File | `/administrator/components/table_manager/` | High
|
||||
11 | File | `/api/appInternals/1.0/agent/configuration&` | High
|
||||
12 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
|
||||
13 | File | `/api/fetch` | Medium
|
||||
14 | File | `/api/ZRMesh/set_ZRMesh` | High
|
||||
15 | File | `/audit/log/log_management.php` | High
|
||||
16 | File | `/cloud_config/router_post/register` | High
|
||||
17 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
18 | File | `/Hospital-Management-System-master/contact.php` | High
|
||||
19 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
20 | File | `/i/:data/ipa.plist` | High
|
||||
21 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
|
||||
22 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
3 | File | `/admin.php/admin/art/data.html` | High
|
||||
4 | File | `/admin/?page=user/manage_user` | High
|
||||
5 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
|
||||
6 | File | `/admin/customers.php?page=1&cID` | High
|
||||
7 | File | `/admin/edit_user.php` | High
|
||||
8 | File | `/admin/files` | Medium
|
||||
9 | File | `/admin/login.php` | High
|
||||
10 | File | `/administrator/components/menu/` | High
|
||||
11 | File | `/administrator/components/table_manager/` | High
|
||||
12 | File | `/api/appInternals/1.0/agent/configuration&` | High
|
||||
13 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
|
||||
14 | File | `/api/fetch` | Medium
|
||||
15 | File | `/api/user/{ID}` | High
|
||||
16 | File | `/audit/log/log_management.php` | High
|
||||
17 | File | `/cloud_config/router_post/register` | High
|
||||
18 | File | `/config/list` | Medium
|
||||
19 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
20 | File | `/Hospital-Management-System-master/contact.php` | High
|
||||
21 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
22 | File | `/i/:data/ipa.plist` | High
|
||||
23 | File | `/jerry-core/jmem/jmem-heap.c` | High
|
||||
24 | File | `/ManageRoute/postRoute` | High
|
||||
25 | ... | ... | ...
|
||||
25 | File | `/ms/cms/content/list.do` | High
|
||||
26 | File | `/orms/` | Low
|
||||
27 | ... | ... | ...
|
||||
|
||||
There are 214 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 232 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
The following _campaigns_ are known and can be associated with APT36:
|
||||
|
||||
* C-Major
|
||||
* Crimson RAT
|
||||
|
||||
## Countries
|
||||
|
||||
|
@ -34,14 +35,14 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
5 | [5.189.167.65](https://vuldb.com/?ip.5.189.167.65) | vmi437585.contaboserver.net | C-Major | High
|
||||
6 | [23.254.119.11](https://vuldb.com/?ip.23.254.119.11) | - | - | High
|
||||
7 | [64.188.12.126](https://vuldb.com/?ip.64.188.12.126) | 64.188.12.126.static.quadranet.com | - | High
|
||||
8 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
|
||||
9 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
|
||||
10 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
|
||||
11 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
|
||||
12 | [82.196.13.94](https://vuldb.com/?ip.82.196.13.94) | - | C-Major | High
|
||||
8 | [64.188.25.205](https://vuldb.com/?ip.64.188.25.205) | 64.188.25.205.static.quadranet.com | Crimson RAT | High
|
||||
9 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
|
||||
10 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
|
||||
11 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
|
||||
12 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
|
||||
13 | ... | ... | ... | ...
|
||||
|
||||
There are 46 more IOC items available. Please use our online service to access the data.
|
||||
There are 47 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -96,6 +97,7 @@ There are 229 more IOA items available (file, library, argument, input value, pa
|
|||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.05.13/Transparent%20Tribe.pdf
|
||||
* https://www.threatminer.org/report.php?q=indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf&y=2016
|
||||
* https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html
|
||||
|
|
|
@ -1,53 +1,53 @@
|
|||
# APT37 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT37](https://vuldb.com/?actor.apt37). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT37](https://vuldb.com/?actor.apt37). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt37](https://vuldb.com/?actor.apt37)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt37](https://vuldb.com/?actor.apt37)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with APT37:
|
||||
The following _campaigns_ are known and can be associated with APT37:
|
||||
|
||||
* Daybreak
|
||||
* Scarcruft
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT37:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT37:
|
||||
|
||||
* US
|
||||
* PL
|
||||
* RU
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT37.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT37.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 34.13.42.35 | - | High
|
||||
2 | 120.192.73.202 | - | High
|
||||
3 | 180.182.52.76 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [34.13.42.35](https://vuldb.com/?ip.34.13.42.35) | - | Scarcruft | High
|
||||
2 | [120.192.73.202](https://vuldb.com/?ip.120.192.73.202) | - | Scarcruft | High
|
||||
3 | [180.182.52.76](https://vuldb.com/?ip.180.182.52.76) | - | Scarcruft | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by APT37. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT37_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1600 | Cryptographic Issues | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
3 | T1600 | CWE-310 | Cryptographic Issues | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT37. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT37. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -56,18 +56,18 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `includes/startup.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 5 more IOA items available. Please use our online service to access the data.
|
||||
There are 5 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://securelist.com/operation-daybreak/75100/
|
||||
* https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -30,7 +30,7 @@ There are 2 more IOC items available. Please use our online service to access th
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT38_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT38_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -60,9 +60,10 @@ ID | Type | Indicator | Confidence
|
|||
5 | File | `/magnoliaPublic/travel/members/login.html` | High
|
||||
6 | File | `/Main_AdmStatus_Content.asp` | High
|
||||
7 | File | `/server-status` | High
|
||||
8 | ... | ... | ...
|
||||
8 | File | `/uncpath/` | Medium
|
||||
9 | ... | ... | ...
|
||||
|
||||
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 62 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -109,7 +109,7 @@ ID | Type | Indicator | Confidence
|
|||
33 | File | `admin.php/comments/batchdel/` | High
|
||||
34 | ... | ... | ...
|
||||
|
||||
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 291 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -20,7 +20,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Abcbot_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Abcbot_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Adrozek - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Adrozek](https://vuldb.com/?actor.adrozek). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Adrozek](https://vuldb.com/?actor.adrozek). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.adrozek](https://vuldb.com/?actor.adrozek)
|
||||
|
||||
|
@ -10,8 +10,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 104.21.70.96 | - | - | High
|
||||
2 | 172.67.222.123 | - | - | High
|
||||
1 | [104.21.70.96](https://vuldb.com/?ip.104.21.70.96) | - | - | High
|
||||
2 | [172.67.222.123](https://vuldb.com/?ip.172.67.222.123) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [US](https://vuldb.com/?country.us)
|
||||
* ...
|
||||
|
||||
There are 9 more country items available. Please use our online service to access the data.
|
||||
There are 10 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -38,7 +38,8 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
15 | [34.104.35.123](https://vuldb.com/?ip.34.104.35.123) | 123.35.104.34.bc.googleusercontent.com | - | Medium
|
||||
16 | [38.132.109.186](https://vuldb.com/?ip.38.132.109.186) | - | - | High
|
||||
17 | [41.78.118.2](https://vuldb.com/?ip.41.78.118.2) | - | - | High
|
||||
18 | ... | ... | ... | ...
|
||||
18 | [41.189.230.12](https://vuldb.com/?ip.41.189.230.12) | - | - | High
|
||||
19 | ... | ... | ... | ...
|
||||
|
||||
There are 70 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
|
@ -63,53 +64,53 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `.travis.yml` | Medium
|
||||
2 | File | `/.env` | Low
|
||||
3 | File | `/.ssh/authorized_keys` | High
|
||||
4 | File | `/account/details.php` | High
|
||||
5 | File | `/admin.php` | Medium
|
||||
6 | File | `/admin/user/manage` | High
|
||||
7 | File | `/anony/mjpg.cgi` | High
|
||||
8 | File | `/artist-display.php` | High
|
||||
9 | File | `/customer_demo/index2.html` | High
|
||||
10 | File | `/file?action=download&file` | High
|
||||
11 | File | `/home/httpd/cgi-bin/cgi.cgi` | High
|
||||
12 | File | `/html/includes/graphs/port/mac_acc_total.inc.php` | High
|
||||
13 | File | `/inc/subscriber_list.php` | High
|
||||
14 | File | `/install/index.php` | High
|
||||
15 | File | `/layout/class.xblogcomment.php` | High
|
||||
16 | File | `/LEPTON_stable_2.2.2/upload/admins/admintools/tool.php` | High
|
||||
17 | File | `/manager/jsp/test.jsp` | High
|
||||
18 | File | `/medical/inventories.php` | High
|
||||
19 | File | `/monitoring` | Medium
|
||||
20 | File | `/plugins/servlet/audit/resource` | High
|
||||
21 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
22 | File | `/replication` | Medium
|
||||
23 | File | `/RestAPI` | Medium
|
||||
24 | File | `/TeleoptiWFM/Administration/GetOneTenant` | High
|
||||
25 | File | `/tmp` | Low
|
||||
26 | File | `/tmp/speedtest_urls.xml` | High
|
||||
27 | File | `/uncpath/` | Medium
|
||||
28 | File | `/usr/bin/at` | Medium
|
||||
29 | File | `/var/log/nginx` | High
|
||||
30 | File | `/_vti_pvt/access.cnf` | High
|
||||
31 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
32 | File | `admin/e_mesaj_yaz.asp` | High
|
||||
33 | File | `admin/mcart_xls_import.php` | High
|
||||
34 | File | `admin/profile.php` | High
|
||||
35 | File | `admin/salesadmin.php` | High
|
||||
36 | File | `admin/systemWebAdminConfig.do` | High
|
||||
37 | File | `admin11.cgi` | Medium
|
||||
38 | File | `admincp/auth/checklogin.php` | High
|
||||
39 | File | `agenda2.php3` | Medium
|
||||
40 | File | `ajax-actions.php` | High
|
||||
41 | ... | ... | ...
|
||||
3 | File | `/admin.php` | Medium
|
||||
4 | File | `/admin/user/manage` | High
|
||||
5 | File | `/anony/mjpg.cgi` | High
|
||||
6 | File | `/artist-display.php` | High
|
||||
7 | File | `/customer_demo/index2.html` | High
|
||||
8 | File | `/file?action=download&file` | High
|
||||
9 | File | `/home/httpd/cgi-bin/cgi.cgi` | High
|
||||
10 | File | `/html/includes/graphs/port/mac_acc_total.inc.php` | High
|
||||
11 | File | `/inc/subscriber_list.php` | High
|
||||
12 | File | `/install/index.php` | High
|
||||
13 | File | `/layout/class.xblogcomment.php` | High
|
||||
14 | File | `/LEPTON_stable_2.2.2/upload/admins/admintools/tool.php` | High
|
||||
15 | File | `/manager/jsp/test.jsp` | High
|
||||
16 | File | `/medical/inventories.php` | High
|
||||
17 | File | `/monitoring` | Medium
|
||||
18 | File | `/plugins/servlet/audit/resource` | High
|
||||
19 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
20 | File | `/public/login.htm` | High
|
||||
21 | File | `/replication` | Medium
|
||||
22 | File | `/RestAPI` | Medium
|
||||
23 | File | `/TeleoptiWFM/Administration/GetOneTenant` | High
|
||||
24 | File | `/tmp` | Low
|
||||
25 | File | `/tmp/speedtest_urls.xml` | High
|
||||
26 | File | `/uncpath/` | Medium
|
||||
27 | File | `/usr/bin/at` | Medium
|
||||
28 | File | `/var/log/nginx` | High
|
||||
29 | File | `/_vti_pvt/access.cnf` | High
|
||||
30 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
31 | File | `admin/e_mesaj_yaz.asp` | High
|
||||
32 | File | `admin/mcart_xls_import.php` | High
|
||||
33 | File | `admin/profile.php` | High
|
||||
34 | File | `admin/salesadmin.php` | High
|
||||
35 | File | `admin/systemWebAdminConfig.do` | High
|
||||
36 | File | `admin11.cgi` | Medium
|
||||
37 | File | `admincp/auth/checklogin.php` | High
|
||||
38 | File | `agenda2.php3` | Medium
|
||||
39 | File | `ajax-actions.php` | High
|
||||
40 | ... | ... | ...
|
||||
|
||||
There are 349 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 347 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/ManagedGuard/AfricaBlackList/blob/main/MGAfricaIPBlackList.txt
|
||||
* https://isc.sans.edu/forums/diary/Hunting+for+Phishing+Sites+Masquerading+as+Outlook+Web+Access/27974/
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -15,11 +15,11 @@ The following _campaigns_ are known and can be associated with Agent Tesla:
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Agent Tesla:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 8 more country items available. Please use our online service to access the data.
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -27,13 +27,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [69.174.99.181](https://vuldb.com/?ip.69.174.99.181) | unassigned.quadranet.com | Phishing Korea | High
|
||||
2 | [149.56.200.165](https://vuldb.com/?ip.149.56.200.165) | ip165.ip-149-56-200.net | Phishing Korea | High
|
||||
3 | [208.91.199.223](https://vuldb.com/?ip.208.91.199.223) | us2.outbound.mailhostbox.com | - | High
|
||||
1 | [31.3.251.197](https://vuldb.com/?ip.31.3.251.197) | h31-3-251-197.host.redstation.co.uk | - | High
|
||||
2 | [69.174.99.181](https://vuldb.com/?ip.69.174.99.181) | unassigned.quadranet.com | Phishing Korea | High
|
||||
3 | [105.112.112.57](https://vuldb.com/?ip.105.112.112.57) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 13 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Agent Tesla_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Agent Tesla_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -51,65 +54,61 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/+CSCOE+/logon.html` | High
|
||||
2 | File | `/cgi-bin/wapopen` | High
|
||||
3 | File | `/etc/ajenti/config.yml` | High
|
||||
4 | File | `/goform/telnet` | High
|
||||
5 | File | `/modules/profile/index.php` | High
|
||||
6 | File | `/php/init.poll.php` | High
|
||||
7 | File | `/rom-0` | Low
|
||||
8 | File | `/tmp/phpglibccheck` | High
|
||||
9 | File | `/uncpath/` | Medium
|
||||
10 | File | `/var/tmp/sess_*` | High
|
||||
11 | File | `action.php` | Medium
|
||||
12 | File | `actionphp/download.File.php` | High
|
||||
13 | File | `add_comment.php` | High
|
||||
14 | File | `admin/admin.php` | High
|
||||
15 | File | `admin/content.php` | High
|
||||
16 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
|
||||
17 | File | `admin/memberviewdetails.php` | High
|
||||
18 | File | `admin/sitesettings.php` | High
|
||||
19 | File | `affich.php` | Medium
|
||||
20 | File | `agent/Core/Controller/SendRequest.cpp` | High
|
||||
21 | File | `akeyActivationLogin.do` | High
|
||||
22 | File | `album_portal.php` | High
|
||||
23 | File | `apache-auth.conf` | High
|
||||
24 | File | `askapache-firefox-adsense.php` | High
|
||||
25 | File | `attachment.cgi` | High
|
||||
26 | File | `basic_search_result.php` | High
|
||||
27 | File | `blueprints/sections/edit/1` | High
|
||||
28 | File | `books.php` | Medium
|
||||
29 | File | `cart_add.php` | Medium
|
||||
30 | File | `CFS.c` | Low
|
||||
31 | File | `cgi-bin/gnudip.cgi` | High
|
||||
32 | File | `checktransferstatus.php` | High
|
||||
33 | File | `checkuser.php` | High
|
||||
34 | File | `class.SystemAction.php` | High
|
||||
35 | File | `clientarea.php` | High
|
||||
36 | File | `cmdmon.c` | Medium
|
||||
37 | File | `collectivite.class.php` | High
|
||||
38 | File | `confirm.php` | Medium
|
||||
39 | File | `contact` | Low
|
||||
40 | File | `control.c` | Medium
|
||||
41 | File | `core-util.c` | Medium
|
||||
42 | File | `core/coreuserinputhandler.cpp` | High
|
||||
43 | File | `d1_both.c` | Medium
|
||||
44 | File | `data/gbconfiguration.dat` | High
|
||||
45 | File | `Debug_command_page.asp` | High
|
||||
46 | File | `details_view.php` | High
|
||||
47 | File | `Diagnose.exe` | Medium
|
||||
48 | File | `DigiDocSAXParser.c` | High
|
||||
49 | File | `download-file.php` | High
|
||||
50 | File | `download.php` | Medium
|
||||
51 | File | `e/member/doaction.php` | High
|
||||
52 | ... | ... | ...
|
||||
2 | File | `/api/addusers` | High
|
||||
3 | File | `/cgi-bin/wapopen` | High
|
||||
4 | File | `/etc/ajenti/config.yml` | High
|
||||
5 | File | `/goform/telnet` | High
|
||||
6 | File | `/include/chart_generator.php` | High
|
||||
7 | File | `/modules/profile/index.php` | High
|
||||
8 | File | `/public/login.htm` | High
|
||||
9 | File | `/rom-0` | Low
|
||||
10 | File | `/tmp/phpglibccheck` | High
|
||||
11 | File | `/uncpath/` | Medium
|
||||
12 | File | `/usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php` | High
|
||||
13 | File | `/var/log/nginx` | High
|
||||
14 | File | `/var/tmp/sess_*` | High
|
||||
15 | File | `action.php` | Medium
|
||||
16 | File | `actionphp/download.File.php` | High
|
||||
17 | File | `add_comment.php` | High
|
||||
18 | File | `admin.a6mambocredits.php` | High
|
||||
19 | File | `admin.php` | Medium
|
||||
20 | File | `admin/admin.php` | High
|
||||
21 | File | `admin/content.php` | High
|
||||
22 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
|
||||
23 | File | `admin/memberviewdetails.php` | High
|
||||
24 | File | `admin/sitesettings.php` | High
|
||||
25 | File | `affich.php` | Medium
|
||||
26 | File | `agent/Core/Controller/SendRequest.cpp` | High
|
||||
27 | File | `akeyActivationLogin.do` | High
|
||||
28 | File | `album_portal.php` | High
|
||||
29 | File | `apache-auth.conf` | High
|
||||
30 | File | `askapache-firefox-adsense.php` | High
|
||||
31 | File | `attachment.cgi` | High
|
||||
32 | File | `blueprints/sections/edit/1` | High
|
||||
33 | File | `books.php` | Medium
|
||||
34 | File | `cart_add.php` | Medium
|
||||
35 | File | `category.cfm` | Medium
|
||||
36 | File | `CFS.c` | Low
|
||||
37 | File | `cgi-bin/gnudip.cgi` | High
|
||||
38 | File | `checktransferstatus.php` | High
|
||||
39 | File | `checkuser.php` | High
|
||||
40 | File | `class.SystemAction.php` | High
|
||||
41 | File | `clientarea.php` | High
|
||||
42 | File | `cmdmon.c` | Medium
|
||||
43 | File | `collectivite.class.php` | High
|
||||
44 | File | `confirm.php` | Medium
|
||||
45 | File | `contact` | Low
|
||||
46 | File | `control.c` | Medium
|
||||
47 | ... | ... | ...
|
||||
|
||||
There are 448 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 405 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2020/04/threat-spotlight-secret-agent-tesla
|
||||
* https://services.global.ntt/en-us/insights/blog/discovering-a-new-agent-tesla-malware-sample
|
||||
* https://www.fortinet.com/blog/threat-research/phishing-campaign-targeting-korean-to-deliver-agent-tesla-new-variant
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -1,45 +1,45 @@
|
|||
# Amnesia - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Amnesia](https://vuldb.com/?actor.amnesia). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Amnesia](https://vuldb.com/?actor.amnesia). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.amnesia](https://vuldb.com/?actor.amnesia)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.amnesia](https://vuldb.com/?actor.amnesia)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Amnesia:
|
||||
The following _campaigns_ are known and can be associated with Amnesia:
|
||||
|
||||
* TVT Digital DVR Devices
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Amnesia:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Amnesia:
|
||||
|
||||
* US
|
||||
* IN
|
||||
* NL
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [IN](https://vuldb.com/?country.in)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* ...
|
||||
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Amnesia.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Amnesia.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 93.174.95.38 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [93.174.95.38](https://vuldb.com/?ip.93.174.95.38) | - | TVT Digital DVR Devices | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Amnesia. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Amnesia_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Amnesia. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Amnesia. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -48,17 +48,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `/public/login.htm` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 3 more IOA items available. Please use our online service to access the data.
|
||||
There are 3 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Anatsa - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Anatsa](https://vuldb.com/?actor.anatsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Anatsa](https://vuldb.com/?actor.anatsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.anatsa](https://vuldb.com/?actor.anatsa)
|
||||
|
||||
|
@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Anatsa:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -30,6 +31,7 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | Library | `FARFLT.SYS` | Medium
|
||||
2 | Argument | `wan_dyn_hostname` | High
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# ApoMacroSploit - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ApoMacroSploit](https://vuldb.com/?actor.apomacrosploit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ApoMacroSploit](https://vuldb.com/?actor.apomacrosploit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apomacrosploit](https://vuldb.com/?actor.apomacrosploit)
|
||||
|
||||
|
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with ApoMacroSploit:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,7 +16,7 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 185.157.161.109 | 185-157-161-109.pool.ovpn.com | - | High
|
||||
1 | [185.157.161.109](https://vuldb.com/?ip.185.157.161.109) | 185-157-161-109.pool.ovpn.com | - | High
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,61 +1,70 @@
|
|||
# Armor Piercer - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Armor Piercer](https://vuldb.com/?actor.armor_piercer). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Armor Piercer](https://vuldb.com/?actor.armor_piercer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.armor_piercer](https://vuldb.com/?actor.armor_piercer)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.armor_piercer](https://vuldb.com/?actor.armor_piercer)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Armor Piercer:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Armor Piercer:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* IT
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [CE](https://vuldb.com/?country.ce)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Armor Piercer.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Armor Piercer.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.252.179.221 | no-rdns.mivocloud.com | High
|
||||
2 | 45.79.81.88 | li1180-88.members.linode.com | High
|
||||
3 | 64.188.13.46 | 64.188.13.46.static.quadranet.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.252.179.221](https://vuldb.com/?ip.5.252.179.221) | no-rdns.mivocloud.com | - | High
|
||||
2 | [45.79.81.88](https://vuldb.com/?ip.45.79.81.88) | li1180-88.members.linode.com | - | High
|
||||
3 | [64.188.13.46](https://vuldb.com/?ip.64.188.13.46) | 64.188.13.46.static.quadranet.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Armor Piercer_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1495 | CWE-494 | Download of Code Without Integrity Check | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `app\admin\controller\sys\Uploads.php` | High
|
||||
2 | File | `category.cfm` | Medium
|
||||
3 | File | `itemlookup.asp` | High
|
||||
4 | ... | ... | ...
|
||||
1 | File | `/rapi/read_url` | High
|
||||
2 | File | `/wp-admin/admin-post.php?es_skip=1&option_name` | High
|
||||
3 | File | `app\admin\controller\sys\Uploads.php` | High
|
||||
4 | File | `category.cfm` | Medium
|
||||
5 | File | `coders/png.c` | Medium
|
||||
6 | ... | ... | ...
|
||||
|
||||
There are 6 more IOA items available. Please use our online service to access the data.
|
||||
There are 41 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/09/operation-armor-piercer.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,99 @@
|
|||
# ArtFulpie - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ArtFulpie](https://vuldb.com/?actor.artfulpie). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.artfulpie](https://vuldb.com/?actor.artfulpie)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with ArtFulpie:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ArtFulpie.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [193.56.28.103](https://vuldb.com/?ip.193.56.28.103) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _ArtFulpie_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by ArtFulpie. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin/loginc.php` | High
|
||||
3 | File | `/Applications/Calculator.app/Contents/MacOS/Calculator` | High
|
||||
4 | File | `/cgi-bin/` | Medium
|
||||
5 | File | `/cgi-bin/luci` | High
|
||||
6 | File | `/common/info.cgi` | High
|
||||
7 | File | `/config.cgi?webmin` | High
|
||||
8 | File | `/data/inc/images.php` | High
|
||||
9 | File | `/dev/block/mmcblk0rpmb` | High
|
||||
10 | File | `/edit` | Low
|
||||
11 | File | `/etc/passwd` | Medium
|
||||
12 | File | `/etc/stunnel.key` | High
|
||||
13 | File | `/etc/sysconfig/btrfsmaintenance` | High
|
||||
14 | File | `/framework/modules/notfound/controllers/notfoundController.php` | High
|
||||
15 | File | `/gadgets/definitions/uptime.CapacityWhatIfGadget/getmetrics.php` | High
|
||||
16 | File | `/job-details` | Medium
|
||||
17 | File | `/mib.db` | Low
|
||||
18 | File | `/page/add` | Medium
|
||||
19 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
|
||||
20 | File | `/system-info/health` | High
|
||||
21 | File | `/tmp/s48lose.tmp` | High
|
||||
22 | File | `/tmp/xbindkeysrc-tmp` | High
|
||||
23 | File | `/uncpath/` | Medium
|
||||
24 | File | `/usr/local` | Medium
|
||||
25 | File | `/var/log/nginx` | High
|
||||
26 | File | `/var/run/jboss-eap/` | High
|
||||
27 | File | `admin-ajax.php` | High
|
||||
28 | File | `admin.jcomments.php` | High
|
||||
29 | File | `admin.php` | Medium
|
||||
30 | File | `admin/?n=language&c=language_general&a=doSearchParameter` | High
|
||||
31 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
|
||||
32 | File | `admin/admin_log/index.html?user_id` | High
|
||||
33 | File | `admin/admin_menu.php` | High
|
||||
34 | File | `admin/config.php` | High
|
||||
35 | File | `admin/content.php` | High
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 305 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045e
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,28 +1,28 @@
|
|||
# Ashiyane - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Ashiyane](https://vuldb.com/?actor.ashiyane). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Ashiyane](https://vuldb.com/?actor.ashiyane). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.ashiyane](https://vuldb.com/?actor.ashiyane)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ashiyane](https://vuldb.com/?actor.ashiyane)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Ashiyane.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Ashiyane.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 62.171.141.97 | vmi345419.contaboserver.net | High
|
||||
2 | 104.21.2.112 | - | High
|
||||
3 | 172.67.129.30 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [62.171.141.97](https://vuldb.com/?ip.62.171.141.97) | vmi345419.contaboserver.net | - | High
|
||||
2 | [104.21.2.112](https://vuldb.com/?ip.104.21.2.112) | - | - | High
|
||||
3 | [172.67.129.30](https://vuldb.com/?ip.172.67.129.30) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://ddanchev.blogspot.com/2022/01/exposing-behrooz-kamalians-ashiyane-ict.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,32 +1,32 @@
|
|||
# Astro Locker - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Astro Locker](https://vuldb.com/?actor.astro_locker). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Astro Locker](https://vuldb.com/?actor.astro_locker). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.astro_locker](https://vuldb.com/?actor.astro_locker)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.astro_locker](https://vuldb.com/?actor.astro_locker)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Astro Locker:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Astro Locker:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Astro Locker.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Astro Locker.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 45.134.21.8 | - | High
|
||||
2 | 46.21.153.135 | 135.153.21.46.static.swiftway.net | High
|
||||
3 | 139.60.161.68 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [45.134.21.8](https://vuldb.com/?ip.45.134.21.8) | - | - | High
|
||||
2 | [46.21.153.135](https://vuldb.com/?ip.46.21.153.135) | 135.153.21.46.static.swiftway.net | - | High
|
||||
3 | [139.60.161.68](https://vuldb.com/?ip.139.60.161.68) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Astro Locker. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Astro Locker. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -35,17 +35,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `ajax_php_pecl.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 11 more IOA items available. Please use our online service to access the data.
|
||||
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/sophoslabs/IoCs/blob/master/Ransomware-AstroLocker.csv
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,31 +1,31 @@
|
|||
# Aveo - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?doc.cti) of the actor known as [Aveo](https://vuldb.com/?actor.aveo). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Aveo](https://vuldb.com/?actor.aveo). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.aveo](https://vuldb.com/?actor.aveo)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.aveo](https://vuldb.com/?actor.aveo)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Aveo:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Aveo:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Aveo.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Aveo.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 50.63.202.38 | ip-50-63-202-38.ip.secureserver.net | High
|
||||
2 | 104.202.173.82 | 104-202-173-82.dyn.grandenetworks.net | High
|
||||
3 | 107.180.36.179 | ip-107-180-36-179.ip.secureserver.net | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [50.63.202.38](https://vuldb.com/?ip.50.63.202.38) | ip-50-63-202-38.ip.secureserver.net | - | High
|
||||
2 | [104.202.173.82](https://vuldb.com/?ip.104.202.173.82) | 104-202-173-82.dyn.grandenetworks.net | - | High
|
||||
3 | [107.180.36.179](https://vuldb.com/?ip.107.180.36.179) | ip-107-180-36-179.ip.secureserver.net | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Aveo. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Aveo. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -33,18 +33,18 @@ ID | Type | Indicator | Confidence
|
|||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-aveo-malware-family-targets-japanese-speaking-users/
|
||||
* https://www.threatminer.org/report.php?q=AveoMalwareFamilyTargetsJapaneseSpeakingUsers-PaloAltoNetworksBlogPaloAltoNetworksBlog.pdf&y=2016
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?doc.cti)
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2021](https://vuldb.com/?doc.changelog) by [vuldb.com](https://vuldb.com/?doc.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?doc.faq), read the [documentation](https://vuldb.com/?doc) or [contact us](https://vuldb.com/?contact)!
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
||||
|
|
|
@ -0,0 +1,68 @@
|
|||
# Azorult - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Azorult](https://vuldb.com/?actor.azorult). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.azorult](https://vuldb.com/?actor.azorult)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Azorult:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Azorult.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [149.129.216.194](https://vuldb.com/?ip.149.129.216.194) | - | - | High
|
||||
2 | [209.141.59.124](https://vuldb.com/?ip.209.141.59.124) | buyvm.mpipalia.com | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Azorult_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1222 | CWE-275 | Permission Issues | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Azorult. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
2 | File | `components/bitrix/mobileapp.list/ajax.php/` | High
|
||||
3 | File | `hbs` | Low
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 10 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/More+malspam+pushing+passwordprotected+Word+docs+for+AZORult+and+Hermes+Ransomware/23992/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [SC](https://vuldb.com/?country.sc)
|
||||
* [UA](https://vuldb.com/?country.ua)
|
||||
* ...
|
||||
|
||||
There are 9 more country items available. Please use our online service to access the data.
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -45,12 +45,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
1 | T1008 | CWE-757 | Algorithm Downgrade | High
|
||||
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -59,17 +59,17 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
2 | File | `/admin.php/admin/art/data.html` | High
|
||||
3 | File | `/admin.php/admin/plog/index.html` | High
|
||||
4 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
5 | File | `/admin.php/admin/vod/data.html` | High
|
||||
6 | File | `/admin/files` | Medium
|
||||
6 | File | `/admin.php/admin/website/data.html` | High
|
||||
7 | File | `/admin/login.php` | High
|
||||
8 | File | `/admin/news/news_mod.php` | High
|
||||
9 | File | `/admin/news/news_ok.php` | High
|
||||
10 | File | `/admin/options` | High
|
||||
11 | File | `/admin/page_edit/3` | High
|
||||
12 | File | `/admin/templates/template_manage.php` | High
|
||||
10 | File | `/admin/templates/template_manage.php` | High
|
||||
11 | File | `/api /v3/auth` | High
|
||||
12 | File | `/app/controller/Books.php` | High
|
||||
13 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
14 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
15 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
|
@ -80,12 +80,15 @@ ID | Type | Indicator | Confidence
|
|||
20 | File | `/data/sqldata` | High
|
||||
21 | File | `/DataPackageTable` | High
|
||||
22 | File | `/download/` | Medium
|
||||
23 | File | `/etc/passwd` | Medium
|
||||
24 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
25 | File | `/goform/delAd` | High
|
||||
26 | ... | ... | ...
|
||||
23 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
24 | File | `/goform/delAd` | High
|
||||
25 | File | `/goform/exeCommand` | High
|
||||
26 | File | `/goform/form2Reboot.cgi` | High
|
||||
27 | File | `/goform/setAdInfoDetail` | High
|
||||
28 | File | `/goform/setFixTools` | High
|
||||
29 | ... | ... | ...
|
||||
|
||||
There are 215 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 249 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,49 +1,49 @@
|
|||
# BEAR - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BEAR](https://vuldb.com/?actor.bear). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BEAR](https://vuldb.com/?actor.bear). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bear](https://vuldb.com/?actor.bear)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bear](https://vuldb.com/?actor.bear)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BEAR:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BEAR:
|
||||
|
||||
* EE
|
||||
* US
|
||||
* UA
|
||||
* [EE](https://vuldb.com/?country.ee)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [UA](https://vuldb.com/?country.ua)
|
||||
* ...
|
||||
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BEAR.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BEAR.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.149.248.67 | mx1-mail.com | High
|
||||
2 | 5.149.248.193 | - | High
|
||||
3 | 5.149.249.172 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.149.248.67](https://vuldb.com/?ip.5.149.248.67) | mx1-mail.com | - | High
|
||||
2 | [5.149.248.193](https://vuldb.com/?ip.5.149.248.193) | - | - | High
|
||||
3 | [5.149.249.172](https://vuldb.com/?ip.5.149.249.172) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BEAR. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BEAR_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | 7PK Security Features | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BEAR. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BEAR. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -52,18 +52,18 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `add_comment.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 24 more IOA items available. Please use our online service to access the data.
|
||||
There are 24 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=CanaBEARFitDownaRabbitHole_StateBoardofElectionAnalysis-ThreatConnect.pdf&y=2016
|
||||
* https://www.threatminer.org/report.php?q=RussiaHacksBellingcatMH17Investigation_ThreatConnect.pdf&y=2016
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,32 +1,32 @@
|
|||
# BabyShark - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BabyShark](https://vuldb.com/?actor.babyshark). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BabyShark](https://vuldb.com/?actor.babyshark). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.babyshark](https://vuldb.com/?actor.babyshark)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babyshark](https://vuldb.com/?actor.babyshark)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with BabyShark:
|
||||
The following _campaigns_ are known and can be associated with BabyShark:
|
||||
|
||||
* BabyShark
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BabyShark.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BabyShark.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 173.248.170.149 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [173.248.170.149](https://vuldb.com/?ip.173.248.170.149) | - | BabyShark | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/_reports/2019/BabySharkMalwarePartTwo%E2%80%93AttacksContinueUsingKimJongRATandPCRat.pdf#viewer.action=download
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# BackdoorDiplomacy - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BackdoorDiplomacy](https://vuldb.com/?actor.backdoordiplomacy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BackdoorDiplomacy](https://vuldb.com/?actor.backdoordiplomacy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.backdoordiplomacy](https://vuldb.com/?actor.backdoordiplomacy)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BackdoorDiplomacy:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* RU
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 24 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 23.83.224.178 | 23.83.224.178.16clouds.com | - | High
|
||||
2 | 23.106.140.207 | 23.106.140.207.16clouds.com | - | High
|
||||
3 | 23.228.203.130 | unassigned.psychz.net | - | High
|
||||
1 | [23.83.224.178](https://vuldb.com/?ip.23.83.224.178) | 23.83.224.178.16clouds.com | - | High
|
||||
2 | [23.106.140.207](https://vuldb.com/?ip.23.106.140.207) | 23.106.140.207.16clouds.com | - | High
|
||||
3 | [23.228.203.130](https://vuldb.com/?ip.23.228.203.130) | unassigned.psychz.net | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 14 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BackdoorDiplomacy. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BackdoorDiplomacy_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -71,31 +71,32 @@ ID | Type | Indicator | Confidence
|
|||
22 | File | `/password.html` | High
|
||||
23 | File | `/proc/ioports` | High
|
||||
24 | File | `/property-list/property_view.php` | High
|
||||
25 | File | `/rest` | Low
|
||||
26 | File | `/rest/api/2/search` | High
|
||||
27 | File | `/s/` | Low
|
||||
28 | File | `/scripts/cpan_config` | High
|
||||
29 | File | `/services/system/setup.json` | High
|
||||
30 | File | `/uncpath/` | Medium
|
||||
31 | File | `/webconsole/APIController` | High
|
||||
32 | File | `/websocket/exec` | High
|
||||
33 | File | `/wp-admin/admin-ajax.php` | High
|
||||
34 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
35 | File | `/_next` | Low
|
||||
36 | File | `4.edu.php\conn\function.php` | High
|
||||
37 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
38 | File | `adclick.php` | Medium
|
||||
39 | File | `addentry.php` | Medium
|
||||
40 | File | `addressbook.php` | High
|
||||
41 | File | `add_comment.php` | High
|
||||
42 | File | `admin/category.inc.php` | High
|
||||
43 | File | `admin/conf_users_edit.php` | High
|
||||
44 | File | `admin/dl_sendmail.php` | High
|
||||
45 | File | `admin/index.php` | High
|
||||
46 | File | `admin/password_forgotten.php` | High
|
||||
47 | ... | ... | ...
|
||||
25 | File | `/ptms/classes/Users.php` | High
|
||||
26 | File | `/rest` | Low
|
||||
27 | File | `/rest/api/2/search` | High
|
||||
28 | File | `/s/` | Low
|
||||
29 | File | `/scripts/cpan_config` | High
|
||||
30 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
31 | File | `/services/system/setup.json` | High
|
||||
32 | File | `/uncpath/` | Medium
|
||||
33 | File | `/webconsole/APIController` | High
|
||||
34 | File | `/websocket/exec` | High
|
||||
35 | File | `/wp-admin/admin-ajax.php` | High
|
||||
36 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
37 | File | `/_next` | Low
|
||||
38 | File | `4.edu.php\conn\function.php` | High
|
||||
39 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
40 | File | `adclick.php` | Medium
|
||||
41 | File | `addentry.php` | Medium
|
||||
42 | File | `add_comment.php` | High
|
||||
43 | File | `admin/category.inc.php` | High
|
||||
44 | File | `admin/conf_users_edit.php` | High
|
||||
45 | File | `admin/dl_sendmail.php` | High
|
||||
46 | File | `admin/index.php` | High
|
||||
47 | File | `admin/password_forgotten.php` | High
|
||||
48 | ... | ... | ...
|
||||
|
||||
There are 411 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 415 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
# BadPatch - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BadPatch](https://vuldb.com/?actor.badpatch). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BadPatch](https://vuldb.com/?actor.badpatch). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.badpatch](https://vuldb.com/?actor.badpatch)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.badpatch](https://vuldb.com/?actor.badpatch)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BadPatch:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BadPatch:
|
||||
|
||||
* DE
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BadPatch.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BadPatch.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 148.251.135.117 | server.pogled.ba | High
|
||||
2 | 195.154.216.74 | 195-154-216-74.rev.poneytelecom.eu | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [148.251.135.117](https://vuldb.com/?ip.148.251.135.117) | server.pogled.ba | - | High
|
||||
2 | [195.154.216.74](https://vuldb.com/?ip.195.154.216.74) | 195-154-216-74.rev.poneytelecom.eu | - | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BadPatch. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BadPatch. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -30,17 +30,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | Argument | `PagePrefix` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 1 more IOA items available. Please use our online service to access the data.
|
||||
There are 1 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=BadPatch-PaloAltoNetworks.pdf&y=2017
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -101,7 +101,7 @@ ID | Type | Indicator | Confidence
|
|||
35 | File | `api/v1/alarms` | High
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 306 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 305 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -30,7 +30,7 @@ There are 1 more IOC items available. Please use our online service to access th
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Bandook_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bandook_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,55 +1,55 @@
|
|||
# Banload - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Banload](https://vuldb.com/?actor.banload). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Banload](https://vuldb.com/?actor.banload). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.banload](https://vuldb.com/?actor.banload)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.banload](https://vuldb.com/?actor.banload)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Banload:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Banload:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Banload.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Banload.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 13.107.21.200 | - | High
|
||||
2 | 31.13.66.19 | xx-fbcdn-shv-01-iad3.fbcdn.net | High
|
||||
3 | 34.102.185.99 | 99.185.102.34.bc.googleusercontent.com | Medium
|
||||
4 | 34.212.89.14 | ec2-34-212-89-14.us-west-2.compute.amazonaws.com | Medium
|
||||
5 | 52.95.165.35 | s3-sa-east-1.amazonaws.com | Medium
|
||||
6 | 52.216.76.254 | s3-1.amazonaws.com | Medium
|
||||
7 | 52.216.84.109 | s3-1.amazonaws.com | Medium
|
||||
8 | 52.216.129.45 | s3-1.amazonaws.com | Medium
|
||||
9 | 52.216.245.54 | s3-1.amazonaws.com | Medium
|
||||
10 | 52.217.33.190 | s3-1.amazonaws.com | Medium
|
||||
11 | 52.217.45.150 | s3-1.amazonaws.com | Medium
|
||||
12 | 52.217.48.70 | s3-1.amazonaws.com | Medium
|
||||
13 | 52.217.79.142 | s3-1.amazonaws.com | Medium
|
||||
14 | 52.217.85.222 | s3-1.amazonaws.com | Medium
|
||||
15 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
|
||||
2 | [31.13.66.19](https://vuldb.com/?ip.31.13.66.19) | xx-fbcdn-shv-01-iad3.fbcdn.net | - | High
|
||||
3 | [34.102.185.99](https://vuldb.com/?ip.34.102.185.99) | 99.185.102.34.bc.googleusercontent.com | - | Medium
|
||||
4 | [34.212.89.14](https://vuldb.com/?ip.34.212.89.14) | ec2-34-212-89-14.us-west-2.compute.amazonaws.com | - | Medium
|
||||
5 | [52.95.165.35](https://vuldb.com/?ip.52.95.165.35) | s3-sa-east-1.amazonaws.com | - | Medium
|
||||
6 | [52.216.76.254](https://vuldb.com/?ip.52.216.76.254) | s3-1.amazonaws.com | - | Medium
|
||||
7 | [52.216.84.109](https://vuldb.com/?ip.52.216.84.109) | s3-1.amazonaws.com | - | Medium
|
||||
8 | [52.216.129.45](https://vuldb.com/?ip.52.216.129.45) | s3-1.amazonaws.com | - | Medium
|
||||
9 | [52.216.245.54](https://vuldb.com/?ip.52.216.245.54) | s3-1.amazonaws.com | - | Medium
|
||||
10 | [52.217.33.190](https://vuldb.com/?ip.52.217.33.190) | s3-1.amazonaws.com | - | Medium
|
||||
11 | [52.217.45.150](https://vuldb.com/?ip.52.217.45.150) | s3-1.amazonaws.com | - | Medium
|
||||
12 | [52.217.48.70](https://vuldb.com/?ip.52.217.48.70) | s3-1.amazonaws.com | - | Medium
|
||||
13 | [52.217.79.142](https://vuldb.com/?ip.52.217.79.142) | s3-1.amazonaws.com | - | Medium
|
||||
14 | [52.217.85.222](https://vuldb.com/?ip.52.217.85.222) | s3-1.amazonaws.com | - | Medium
|
||||
15 | ... | ... | ... | ...
|
||||
|
||||
There are 56 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Banload. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Banload_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Banload. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Banload. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -61,11 +61,11 @@ ID | Type | Indicator | Confidence
|
|||
6 | File | `/oauth/authorize` | High
|
||||
7 | ... | ... | ...
|
||||
|
||||
There are 45 more IOA items available. Please use our online service to access the data.
|
||||
There are 45 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/02/threat-roundup-0129-0205.html
|
||||
* https://blog.talosintelligence.com/2021/03/threat-roundup-0319-0326.html
|
||||
|
@ -73,7 +73,7 @@ The following list contains external sources which discuss the actor and the ass
|
|||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -10,13 +10,15 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
|
||||
1 | [185.244.25.200](https://vuldb.com/?ip.185.244.25.200) | - | - | High
|
||||
2 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.trendmicro.co.jp/archives/20879
|
||||
* https://blog.trendmicro.co.jp/archives/22211
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -1,48 +1,45 @@
|
|||
# BelialDemon - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BelialDemon](https://vuldb.com/?actor.belialdemon). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BelialDemon](https://vuldb.com/?actor.belialdemon). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.belialdemon](https://vuldb.com/?actor.belialdemon)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.belialdemon](https://vuldb.com/?actor.belialdemon)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with BelialDemon:
|
||||
The following _campaigns_ are known and can be associated with BelialDemon:
|
||||
|
||||
* Matanbuchus
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BelialDemon:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BelialDemon:
|
||||
|
||||
* TT
|
||||
* CO
|
||||
* [TT](https://vuldb.com/?country.tt)
|
||||
* [CO](https://vuldb.com/?country.co)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BelialDemon.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BelialDemon.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 34.94.151.129 | 129.151.94.34.bc.googleusercontent.com | Medium
|
||||
2 | 34.105.89.82 | 82.89.105.34.bc.googleusercontent.com | Medium
|
||||
3 | 34.106.243.174 | 174.243.106.34.bc.googleusercontent.com | Medium
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [34.94.151.129](https://vuldb.com/?ip.34.94.151.129) | 129.151.94.34.bc.googleusercontent.com | Matanbuchus | Medium
|
||||
2 | [34.105.89.82](https://vuldb.com/?ip.34.105.89.82) | 82.89.105.34.bc.googleusercontent.com | Matanbuchus | Medium
|
||||
3 | [34.106.243.174](https://vuldb.com/?ip.34.106.243.174) | 174.243.106.34.bc.googleusercontent.com | Matanbuchus | Medium
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BelialDemon_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | Resource Consumption | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
3 | T1548.002 | CWE-285 | Improper Authorization | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -52,13 +49,13 @@ ID | Type | Indicator | Confidence
|
|||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,43 +1,43 @@
|
|||
# Bifrost - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bifrost](https://vuldb.com/?actor.bifrost). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bifrost](https://vuldb.com/?actor.bifrost). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bifrost](https://vuldb.com/?actor.bifrost)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bifrost](https://vuldb.com/?actor.bifrost)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bifrost:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bifrost:
|
||||
|
||||
* ES
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bifrost.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bifrost.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 104.18.10.39 | - | High
|
||||
2 | 172.105.155.183 | li2071-183.members.linode.com | High
|
||||
3 | 173.194.5.216 | lhr25s06-in-f8.1e100.net | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [104.18.10.39](https://vuldb.com/?ip.104.18.10.39) | - | - | High
|
||||
2 | [172.105.155.183](https://vuldb.com/?ip.172.105.155.183) | li2071-183.members.linode.com | - | High
|
||||
3 | [173.194.5.216](https://vuldb.com/?ip.173.194.5.216) | lhr25s06-in-f8.1e100.net | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bifrost. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bifrost_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/04/threat-roundup-0402-0409.html
|
||||
* https://blog.talosintelligence.com/2021/05/threat-roundup-0430-0507.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Bigviktor - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bigviktor](https://vuldb.com/?actor.bigviktor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bigviktor](https://vuldb.com/?actor.bigviktor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bigviktor](https://vuldb.com/?actor.bigviktor)
|
||||
|
||||
|
@ -16,8 +16,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 91.219.75.87 | - | CVE-2020-8515 | High
|
||||
2 | 151.80.235.228 | 228.ip-151-80-235.eu | CVE-2020-8515 | High
|
||||
1 | [91.219.75.87](https://vuldb.com/?ip.91.219.75.87) | - | CVE-2020-8515 | High
|
||||
2 | [151.80.235.228](https://vuldb.com/?ip.151.80.235.228) | 228.ip-151-80-235.eu | CVE-2020-8515 | High
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
# Bisonal - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bisonal](https://vuldb.com/?actor.bisonal). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bisonal](https://vuldb.com/?actor.bisonal). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bisonal](https://vuldb.com/?actor.bisonal)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bisonal](https://vuldb.com/?actor.bisonal)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bisonal.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bisonal.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 116.193.155.38 | - | High
|
||||
2 | 196.44.49.154 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [116.193.155.38](https://vuldb.com/?ip.116.193.155.38) | - | - | High
|
||||
2 | [196.44.49.154](https://vuldb.com/?ip.196.44.49.154) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=BisonalMalwareUsedinAttacksAgainstRussiaandSouthKorea-PaloAltoNetworksBlog.pdf&y=2018
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,49 @@
|
|||
# Bistromath - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bistromath](https://vuldb.com/?actor.bistromath). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bistromath](https://vuldb.com/?actor.bistromath)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bistromath:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bistromath.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [159.100.250.231](https://vuldb.com/?ip.159.100.250.231) | - | - | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bistromath. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `admin/login.asp` | High
|
||||
2 | File | `cat.php` | Low
|
||||
3 | Argument | `CatID` | Low
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 1 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045a
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CO](https://vuldb.com/?country.co)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 16 more country items available. Please use our online service to access the data.
|
||||
There are 17 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [82.221.129.17](https://vuldb.com/?ip.82.221.129.17) | hengill.orangewebsite.com | - | High
|
||||
2 | [82.221.129.18](https://vuldb.com/?ip.82.221.129.18) | baula.orangewebsite.com | - | High
|
||||
3 | [82.221.129.19](https://vuldb.com/?ip.82.221.129.19) | jolnir.orangewebsite.com | - | High
|
||||
1 | [45.11.19.170](https://vuldb.com/?ip.45.11.19.170) | - | - | High
|
||||
2 | [82.221.129.17](https://vuldb.com/?ip.82.221.129.17) | hengill.orangewebsite.com | - | High
|
||||
3 | [82.221.129.18](https://vuldb.com/?ip.82.221.129.18) | baula.orangewebsite.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more IOC items available. Please use our online service to access the data.
|
||||
There are 9 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Bitter_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bitter_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -51,23 +51,25 @@ ID | Type | Indicator | Confidence
|
|||
2 | File | `/etc/gsissh/sshd_config` | High
|
||||
3 | File | `/forms/nslookupHandler` | High
|
||||
4 | File | `/news.dtl.php` | High
|
||||
5 | File | `/systemrw/` | Medium
|
||||
6 | File | `/uncpath/` | Medium
|
||||
7 | File | `/upload/file.php` | High
|
||||
8 | File | `/wp-content/plugins/woocommerce/templates/emails/plain/` | High
|
||||
9 | File | `5.2.9\syscrb.exe` | High
|
||||
10 | File | `admin.cgi` | Medium
|
||||
11 | File | `admin/category.inc.php` | High
|
||||
12 | File | `data/gbconfiguration.dat` | High
|
||||
13 | ... | ... | ...
|
||||
5 | File | `/ptms/?page=user` | High
|
||||
6 | File | `/systemrw/` | Medium
|
||||
7 | File | `/uncpath/` | Medium
|
||||
8 | File | `/upload/file.php` | High
|
||||
9 | File | `/wp-content/plugins/woocommerce/templates/emails/plain/` | High
|
||||
10 | File | `5.2.9\syscrb.exe` | High
|
||||
11 | File | `admin.cgi` | Medium
|
||||
12 | File | `admin/category.inc.php` | High
|
||||
13 | File | `admin/vqmods.app/vqmods.inc.php` | High
|
||||
14 | ... | ... | ...
|
||||
|
||||
There are 99 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 111 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
|
||||
* https://twitter.com/ShadowChasing1/status/1504833720489951234
|
||||
* https://www.threatminer.org/report.php?q=SuspectedBITTERAPTContinuesTargetingGovernmentofChinaandChineseOrganizations.pdf&y=2019
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [FR](https://vuldb.com/?country.fr)
|
||||
* ...
|
||||
|
||||
There are 8 more country items available. Please use our online service to access the data.
|
||||
There are 9 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -34,12 +34,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
1 | T1008 | CWE-757 | Algorithm Downgrade | High
|
||||
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
There are 10 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -49,21 +49,21 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
3 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
4 | File | `/admin.php/admin/vod/data.html` | High
|
||||
5 | File | `/admin/login.php` | High
|
||||
6 | File | `/admin/templates/template_manage.php` | High
|
||||
7 | File | `/api/servers` | Medium
|
||||
8 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
9 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
10 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
11 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
12 | File | `/core/admin/comment.php` | High
|
||||
13 | File | `/data/sqldata` | High
|
||||
14 | File | `/DataPackageTable` | High
|
||||
15 | File | `/download/` | Medium
|
||||
16 | File | `/etc/passwd` | Medium
|
||||
17 | File | `/etc/wpa_supplicant.conf` | High
|
||||
3 | File | `/admin.php/admin/art/data.html` | High
|
||||
4 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
5 | File | `/admin.php/admin/vod/data.html` | High
|
||||
6 | File | `/admin/login.php` | High
|
||||
7 | File | `/admin/templates/template_manage.php` | High
|
||||
8 | File | `/api/servers` | Medium
|
||||
9 | File | `/api /v3/auth` | High
|
||||
10 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
11 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
12 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
13 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
14 | File | `/data/sqldata` | High
|
||||
15 | File | `/DataPackageTable` | High
|
||||
16 | File | `/download/` | Medium
|
||||
17 | File | `/etc/passwd` | Medium
|
||||
18 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
19 | File | `/goform/delAd` | High
|
||||
20 | File | `/goform/form2Reboot.cgi` | High
|
||||
|
@ -72,9 +72,10 @@ ID | Type | Indicator | Confidence
|
|||
23 | File | `/i/:data/ipa.plist` | High
|
||||
24 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
25 | File | `/js/js-parser.c` | High
|
||||
26 | ... | ... | ...
|
||||
26 | File | `/mdiy/dict/listExcludeApp` | High
|
||||
27 | ... | ... | ...
|
||||
|
||||
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 232 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,26 +1,26 @@
|
|||
# Black Vine - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Black Vine](https://vuldb.com/?actor.black_vine). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Black Vine](https://vuldb.com/?actor.black_vine). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.black_vine](https://vuldb.com/?actor.black_vine)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.black_vine](https://vuldb.com/?actor.black_vine)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Black Vine.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Black Vine.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 192.199.254.126 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [192.199.254.126](https://vuldb.com/?ip.192.199.254.126) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=the-black-vine-cyberespionage-group.pdf&y=2015
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# BlackByte - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackByte](https://vuldb.com/?actor.blackbyte). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackByte](https://vuldb.com/?actor.blackbyte). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blackbyte](https://vuldb.com/?actor.blackbyte)
|
||||
|
||||
|
@ -8,8 +8,8 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackByte:
|
||||
|
||||
* US
|
||||
* ES
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -17,11 +17,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 45.9.148.114 | - | - | High
|
||||
1 | [45.9.148.114](https://vuldb.com/?ip.45.9.148.114) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BlackByte. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackByte_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -30,7 +30,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -0,0 +1,84 @@
|
|||
# BlackEnergy - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackEnergy](https://vuldb.com/?actor.blackenergy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blackenergy](https://vuldb.com/?actor.blackenergy)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackEnergy:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [UA](https://vuldb.com/?country.ua)
|
||||
* ...
|
||||
|
||||
There are 14 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackEnergy.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.9.32.230](https://vuldb.com/?ip.5.9.32.230) | static.230.32.9.5.clients.your-server.de | - | High
|
||||
2 | [5.61.38.31](https://vuldb.com/?ip.5.61.38.31) | - | - | High
|
||||
3 | [5.79.80.166](https://vuldb.com/?ip.5.79.80.166) | - | - | High
|
||||
4 | [5.149.254.114](https://vuldb.com/?ip.5.149.254.114) | mail1.auditoriavanzada.info | - | High
|
||||
5 | [5.255.87.39](https://vuldb.com/?ip.5.255.87.39) | - | - | High
|
||||
6 | [31.210.111.154](https://vuldb.com/?ip.31.210.111.154) | - | - | High
|
||||
7 | ... | ... | ... | ...
|
||||
|
||||
There are 23 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackEnergy_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackEnergy. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/BRS_netgear_success.html` | High
|
||||
2 | File | `/uncpath/` | Medium
|
||||
3 | File | `/usr/bin/pkexec` | High
|
||||
4 | File | `/var/log/nginx` | High
|
||||
5 | File | `/webapps/blogs-journals/execute/editBlogEntry` | High
|
||||
6 | File | `/wordpress/wp-admin/admin.php` | High
|
||||
7 | File | `/wp-json` | Medium
|
||||
8 | File | `adclick.php` | Medium
|
||||
9 | File | `add.php` | Low
|
||||
10 | File | `add.php/del.php` | High
|
||||
11 | File | `add_comment.php` | High
|
||||
12 | File | `admin/adminsignin.html` | High
|
||||
13 | ... | ... | ...
|
||||
|
||||
There are 105 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* http://blogs.mcafee.jp/blackenergy-cb6d
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,71 +1,63 @@
|
|||
# BlackNet - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?doc.cti) of the actor known as [BlackNet](https://vuldb.com/?actor.blacknet). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackNet](https://vuldb.com/?actor.blacknet). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.blacknet](https://vuldb.com/?actor.blacknet)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blacknet](https://vuldb.com/?actor.blacknet)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackNet:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackNet:
|
||||
|
||||
* US
|
||||
* NL
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BlackNet.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackNet.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 1.1.1.1 | one.one.one.one | High
|
||||
2 | 37.221.67.91 | - | High
|
||||
3 | 45.133.1.98 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [1.1.1.1](https://vuldb.com/?ip.1.1.1.1) | one.one.one.one | - | High
|
||||
2 | [37.221.67.91](https://vuldb.com/?ip.37.221.67.91) | - | - | High
|
||||
3 | [45.133.1.98](https://vuldb.com/?ip.45.133.1.98) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BlackNet. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackNet_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1499 | Resource Consumption | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackNet. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackNet. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/about.php` | Medium
|
||||
2 | File | `/it-IT/splunkd/__raw/services/get_snapshot` | High
|
||||
3 | File | `/phpwcms/setup/setup.php` | High
|
||||
4 | File | `category.cfm` | Medium
|
||||
5 | File | `comersus_optreviewreadexec.asp` | High
|
||||
6 | File | `data/gbconfiguration.dat` | High
|
||||
7 | File | `index.php` | Medium
|
||||
8 | File | `item_show.php` | High
|
||||
9 | File | `wp-postratings.php` | High
|
||||
10 | Argument | `cat` | Low
|
||||
11 | ... | ... | ...
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 7 more IOA items available. Please use our online service to access the data.
|
||||
There are 15 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/06/threat-roundup-0528-0604.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?doc.cti)
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2021](https://vuldb.com/?doc.changelog) by [vuldb.com](https://vuldb.com/?doc.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?doc.faq), read the [documentation](https://vuldb.com/?doc) or [contact us](https://vuldb.com/?contact)!
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
||||
|
|
|
@ -1,48 +1,47 @@
|
|||
# Bookworm - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bookworm](https://vuldb.com/?actor.bookworm). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bookworm](https://vuldb.com/?actor.bookworm). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bookworm](https://vuldb.com/?actor.bookworm)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bookworm](https://vuldb.com/?actor.bookworm)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Bookworm:
|
||||
The following _campaigns_ are known and can be associated with Bookworm:
|
||||
|
||||
* Thailand
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bookworm:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bookworm:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* KR
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [KR](https://vuldb.com/?country.kr)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bookworm.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bookworm.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 43.248.8.249 | - | High
|
||||
2 | 103.226.127.47 | - | High
|
||||
3 | 104.156.239.105 | 104.156.239.105.vultr.com | Medium
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [43.248.8.249](https://vuldb.com/?ip.43.248.8.249) | - | Thailand | High
|
||||
2 | [103.226.127.47](https://vuldb.com/?ip.103.226.127.47) | - | Thailand | High
|
||||
3 | [104.156.239.105](https://vuldb.com/?ip.104.156.239.105) | 104.156.239.105.vultr.com | Thailand | Medium
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bookworm. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bookworm_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1499 | Resource Consumption | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bookworm. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bookworm. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -51,17 +50,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `cirrus_vga.c` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 6 more IOA items available. Please use our online service to access the data.
|
||||
There are 6 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/attack-campaign-on-the-government-of-thailand-delivers-bookworm-trojan/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Bouncing Golf - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bouncing Golf](https://vuldb.com/?actor.bouncing_golf). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bouncing Golf](https://vuldb.com/?actor.bouncing_golf). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bouncing_golf](https://vuldb.com/?actor.bouncing_golf)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bouncing Golf:
|
||||
|
||||
* US
|
||||
* FR
|
||||
* GB
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 21 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 54.38.51.159 | - | - | High
|
||||
2 | 82.211.31.181 | - | - | High
|
||||
3 | 84.234.96.167 | eronn.erivermle.com | - | High
|
||||
1 | [54.38.51.159](https://vuldb.com/?ip.54.38.51.159) | - | - | High
|
||||
2 | [82.211.31.181](https://vuldb.com/?ip.82.211.31.181) | - | - | High
|
||||
3 | [84.234.96.167](https://vuldb.com/?ip.84.234.96.167) | eronn.erivermle.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Bouncing Golf. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bouncing Golf_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -55,24 +55,24 @@ ID | Type | Indicator | Confidence
|
|||
6 | File | `/forum/away.php` | High
|
||||
7 | File | `/get_getnetworkconf.cgi` | High
|
||||
8 | File | `/horde/util/go.php` | High
|
||||
9 | File | `/new` | Low
|
||||
10 | File | `/show_news.php` | High
|
||||
11 | File | `/tmp` | Low
|
||||
12 | File | `/uncpath/` | Medium
|
||||
13 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
|
||||
14 | File | `/ViewUserHover.jspa` | High
|
||||
15 | File | `AccountStatus.jsp` | High
|
||||
16 | File | `adclick.php` | Medium
|
||||
17 | File | `add.php` | Low
|
||||
18 | File | `admin/systemOutOfBand.do` | High
|
||||
19 | File | `app/application.cpp` | High
|
||||
20 | File | `auth-gss2.c` | Medium
|
||||
21 | File | `authent.php4` | Medium
|
||||
22 | File | `base_maintenance.php` | High
|
||||
23 | File | `boardrule.php` | High
|
||||
9 | File | `/mobile_seal/get_seal.php` | High
|
||||
10 | File | `/new` | Low
|
||||
11 | File | `/nova/bin/detnet` | High
|
||||
12 | File | `/show_news.php` | High
|
||||
13 | File | `/tmp` | Low
|
||||
14 | File | `/uncpath/` | Medium
|
||||
15 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
|
||||
16 | File | `/ViewUserHover.jspa` | High
|
||||
17 | File | `AccountStatus.jsp` | High
|
||||
18 | File | `adclick.php` | Medium
|
||||
19 | File | `add.php` | Low
|
||||
20 | File | `admin/systemOutOfBand.do` | High
|
||||
21 | File | `app/application.cpp` | High
|
||||
22 | File | `auth-gss2.c` | Medium
|
||||
23 | File | `authent.php4` | Medium
|
||||
24 | ... | ... | ...
|
||||
|
||||
There are 198 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 201 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,40 +1,40 @@
|
|||
# Brazil Unknown - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Brazil Unknown](https://vuldb.com/?actor.brazil_unknown). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Brazil Unknown](https://vuldb.com/?actor.brazil_unknown). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.brazil_unknown](https://vuldb.com/?actor.brazil_unknown)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.brazil_unknown](https://vuldb.com/?actor.brazil_unknown)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Brazil Unknown:
|
||||
The following _campaigns_ are known and can be associated with Brazil Unknown:
|
||||
|
||||
* Boleto Mestre
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Brazil Unknown:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Brazil Unknown:
|
||||
|
||||
* US
|
||||
* NP
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [NP](https://vuldb.com/?country.np)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Brazil Unknown.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Brazil Unknown.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 65.181.113.87 | mx1.lifestylefundings.com | High
|
||||
2 | 65.181.127.152 | portal2.brewmyidea.com | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [65.181.113.87](https://vuldb.com/?ip.65.181.113.87) | mx1.lifestylefundings.com | Boleto Mestre | High
|
||||
2 | [65.181.127.152](https://vuldb.com/?ip.65.181.127.152) | portal2.brewmyidea.com | Boleto Mestre | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-master-channel-the-boleto-mestre-campaign-targets-brazil/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Bronze Butler - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Butler](https://vuldb.com/?actor.bronze_butler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Butler](https://vuldb.com/?actor.bronze_butler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bronze_butler](https://vuldb.com/?actor.bronze_butler)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Butler:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* KR
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [KR](https://vuldb.com/?country.kr)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 27.255.69.209 | - | - | High
|
||||
2 | 27.255.91.238 | - | - | High
|
||||
3 | 106.184.5.30 | - | - | High
|
||||
1 | [27.255.69.209](https://vuldb.com/?ip.27.255.69.209) | - | - | High
|
||||
2 | [27.255.91.238](https://vuldb.com/?ip.27.255.91.238) | - | - | High
|
||||
3 | [106.184.5.30](https://vuldb.com/?ip.106.184.5.30) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Bronze Butler. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bronze Butler_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,45 +1,42 @@
|
|||
# Bronze Union - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Union](https://vuldb.com/?actor.bronze_union). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Union](https://vuldb.com/?actor.bronze_union). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bronze_union](https://vuldb.com/?actor.bronze_union)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bronze_union](https://vuldb.com/?actor.bronze_union)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Union:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Union:
|
||||
|
||||
* CN
|
||||
* US
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bronze Union.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bronze Union.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 45.114.9.174 | - | High
|
||||
2 | 96.90.63.57 | nleq.com | High
|
||||
3 | 117.136.63.145 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [45.114.9.174](https://vuldb.com/?ip.45.114.9.174) | - | - | High
|
||||
2 | [96.90.63.57](https://vuldb.com/?ip.96.90.63.57) | nleq.com | - | High
|
||||
3 | [117.136.63.145](https://vuldb.com/?ip.117.136.63.145) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bronze Union_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | Resource Consumption | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1548.002 | CWE-285 | Improper Authorization | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -48,17 +45,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `public/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 5 more IOA items available. Please use our online service to access the data.
|
||||
There are 5 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=BRONZEUNIONCyberespionagePersistsDespiteDisclosures_SecureWorks.pdf&y=2017
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,31 +1,31 @@
|
|||
# Bublik - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bublik](https://vuldb.com/?actor.bublik). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bublik](https://vuldb.com/?actor.bublik). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bublik](https://vuldb.com/?actor.bublik)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bublik](https://vuldb.com/?actor.bublik)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bublik.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bublik.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 66.128.53.179 | - | High
|
||||
2 | 104.21.57.186 | - | High
|
||||
3 | 157.240.2.35 | edge-star-mini-shv-01-ort2.facebook.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [66.128.53.179](https://vuldb.com/?ip.66.128.53.179) | - | - | High
|
||||
2 | [104.21.57.186](https://vuldb.com/?ip.104.21.57.186) | - | - | High
|
||||
3 | [157.240.2.35](https://vuldb.com/?ip.157.240.2.35) | edge-star-mini-shv-01-ort2.facebook.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/05/threat-roundup-0507-0514.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,31 @@
|
|||
# BuffetLine - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BuffetLine](https://vuldb.com/?actor.buffetline). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.buffetline](https://vuldb.com/?actor.buffetline)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BuffetLine.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [107.6.12.135](https://vuldb.com/?ip.107.6.12.135) | - | - | High
|
||||
2 | [210.202.40.35](https://vuldb.com/?ip.210.202.40.35) | NK210-202-40-35.vdsl.static.apol.com.tw | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045f
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,59 +1,68 @@
|
|||
# Buhtrap - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Buhtrap](https://vuldb.com/?actor.buhtrap). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Buhtrap](https://vuldb.com/?actor.buhtrap). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.buhtrap](https://vuldb.com/?actor.buhtrap)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.buhtrap](https://vuldb.com/?actor.buhtrap)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Buhtrap:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Buhtrap:
|
||||
|
||||
* RU
|
||||
* US
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Buhtrap.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Buhtrap.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.63.159.32 | 5-63-159-32.cloudvps.regruhosting.ru | High
|
||||
2 | 37.140.195.165 | console.teonet.cloud | High
|
||||
3 | 37.143.12.190 | hosted-by.ihc.ru | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.63.159.32](https://vuldb.com/?ip.5.63.159.32) | 5-63-159-32.cloudvps.regruhosting.ru | - | High
|
||||
2 | [37.140.195.165](https://vuldb.com/?ip.37.140.195.165) | console.teonet.cloud | - | High
|
||||
3 | [37.143.12.190](https://vuldb.com/?ip.37.143.12.190) | hosted-by.ihc.ru | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Buhtrap_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `adclick.php` | Medium
|
||||
2 | File | `adrotate.pm` | Medium
|
||||
3 | File | `article.php` | Medium
|
||||
4 | ... | ... | ...
|
||||
1 | File | `/objects/getImageMP4.php` | High
|
||||
2 | File | `/payu/icpcheckout/` | High
|
||||
3 | File | `/uncpath/` | Medium
|
||||
4 | File | `adclick.php` | Medium
|
||||
5 | File | `admin.php` | Medium
|
||||
6 | File | `adrotate.pm` | Medium
|
||||
7 | File | `article.php` | Medium
|
||||
8 | ... | ... | ...
|
||||
|
||||
There are 4 more IOA items available. Please use our online service to access the data.
|
||||
There are 59 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=gib-buhtrap-report-GroupIB.pdf&y=2016
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,49 +1,49 @@
|
|||
# Butterfly - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Butterfly](https://vuldb.com/?actor.butterfly). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Butterfly](https://vuldb.com/?actor.butterfly). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.butterfly](https://vuldb.com/?actor.butterfly)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.butterfly](https://vuldb.com/?actor.butterfly)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Butterfly:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Butterfly:
|
||||
|
||||
* NL
|
||||
* US
|
||||
* DE
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Butterfly.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Butterfly.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 46.165.237.75 | - | High
|
||||
2 | 46.183.217.132 | skalli.pereformed.com | High
|
||||
3 | 178.162.197.9 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [46.165.237.75](https://vuldb.com/?ip.46.165.237.75) | - | - | High
|
||||
2 | [46.183.217.132](https://vuldb.com/?ip.46.183.217.132) | skalli.pereformed.com | - | High
|
||||
3 | [178.162.197.9](https://vuldb.com/?ip.178.162.197.9) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Butterfly. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Butterfly_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | 7PK Security Features | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Butterfly. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Butterfly. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -61,19 +61,20 @@ ID | Type | Indicator | Confidence
|
|||
12 | File | `admin/orion.extfeedbackform_efbf_forms.php` | High
|
||||
13 | File | `auth-gss2.c` | Medium
|
||||
14 | File | `bin/jp2/convert.c` | High
|
||||
15 | ... | ... | ...
|
||||
15 | File | `books.php` | Medium
|
||||
16 | ... | ... | ...
|
||||
|
||||
There are 123 more IOA items available. Please use our online service to access the data.
|
||||
There are 126 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=butterfly-corporate-spies-out-for-financial-gain.pdf&y=2015
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,49 @@
|
|||
# CCleaner Malware - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CCleaner Malware](https://vuldb.com/?actor.ccleaner_malware). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ccleaner_malware](https://vuldb.com/?actor.ccleaner_malware)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CCleaner Malware:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CCleaner Malware.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [216.126.225.148](https://vuldb.com/?ip.216.126.225.148) | - | - | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CCleaner Malware. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/wbg/core/_includes/authorization.inc.php` | High
|
||||
2 | File | `inc/filebrowser/browser.php` | High
|
||||
3 | File | `wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 2 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://exchange.xforce.ibmcloud.com/collection/CCleaner-Malware-b76e23a6710956bd0782d55976e748ae
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,45 +1,45 @@
|
|||
# CDRThief - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CDRThief](https://vuldb.com/?actor.cdrthief). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CDRThief](https://vuldb.com/?actor.cdrthief). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cdrthief](https://vuldb.com/?actor.cdrthief)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cdrthief](https://vuldb.com/?actor.cdrthief)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CDRThief:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CDRThief:
|
||||
|
||||
* CN
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CDRThief.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CDRThief.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 34.94.199.142 | 142.199.94.34.bc.googleusercontent.com | Medium
|
||||
2 | 35.236.173.187 | 187.173.236.35.bc.googleusercontent.com | Medium
|
||||
3 | 119.29.173.65 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [34.94.199.142](https://vuldb.com/?ip.34.94.199.142) | 142.199.94.34.bc.googleusercontent.com | - | Medium
|
||||
2 | [35.236.173.187](https://vuldb.com/?ip.35.236.173.187) | 187.173.236.35.bc.googleusercontent.com | - | Medium
|
||||
3 | [119.29.173.65](https://vuldb.com/?ip.119.29.173.65) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CDRThief. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CDRThief_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/eset/malware-ioc/tree/master/cdrthief
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -54,41 +54,41 @@ ID | Type | Indicator | Confidence
|
|||
2 | File | `/.vnc/sesman_${username}_passwd` | High
|
||||
3 | File | `/addsrv` | Low
|
||||
4 | File | `/Admin/Views/FileEditor/` | High
|
||||
5 | File | `/article/add` | Medium
|
||||
6 | File | `/cgi-bin/editBookmark` | High
|
||||
7 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
8 | File | `/computer/(agent-name)/api` | High
|
||||
9 | File | `/controller/pay.class.php` | High
|
||||
10 | File | `/dev/block/mmcblk0rpmb` | High
|
||||
11 | File | `/dev/kmem` | Medium
|
||||
12 | File | `/dev/shm` | Medium
|
||||
13 | File | `/dev/snd/seq` | Medium
|
||||
14 | File | `/device/device=140/tab=wifi/view` | High
|
||||
15 | File | `/dl/dl_print.php` | High
|
||||
16 | File | `/getcfg.php` | Medium
|
||||
17 | File | `/goform/addressNat` | High
|
||||
18 | File | `/htdocs/admin/dict.php?id=3` | High
|
||||
19 | File | `/include/menu_v.inc.php` | High
|
||||
20 | File | `/includes/rrdtool.inc.php` | High
|
||||
21 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
|
||||
22 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
|
||||
23 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
24 | File | `/login` | Low
|
||||
25 | File | `/module/module_frame/index.php` | High
|
||||
26 | File | `/notice-edit.php` | High
|
||||
27 | File | `/nova/bin/sniffer` | High
|
||||
28 | File | `/proc/pid/syscall` | High
|
||||
29 | File | `/product_list.php` | High
|
||||
30 | File | `/rest/api/2/user/picker` | High
|
||||
31 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
|
||||
32 | File | `/services/details.asp` | High
|
||||
33 | File | `/src/core/controllers/cm.php` | High
|
||||
34 | File | `/storage/app/media/evil.svg` | High
|
||||
35 | File | `/transmission/web/` | High
|
||||
36 | File | `/uapi/doc` | Medium
|
||||
5 | File | `/api/user/{ID}` | High
|
||||
6 | File | `/article/add` | Medium
|
||||
7 | File | `/cgi-bin/editBookmark` | High
|
||||
8 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
9 | File | `/computer/(agent-name)/api` | High
|
||||
10 | File | `/controller/pay.class.php` | High
|
||||
11 | File | `/dev/block/mmcblk0rpmb` | High
|
||||
12 | File | `/dev/kmem` | Medium
|
||||
13 | File | `/dev/shm` | Medium
|
||||
14 | File | `/dev/snd/seq` | Medium
|
||||
15 | File | `/device/device=140/tab=wifi/view` | High
|
||||
16 | File | `/dl/dl_print.php` | High
|
||||
17 | File | `/getcfg.php` | Medium
|
||||
18 | File | `/goform/addressNat` | High
|
||||
19 | File | `/htdocs/admin/dict.php?id=3` | High
|
||||
20 | File | `/include/menu_v.inc.php` | High
|
||||
21 | File | `/includes/rrdtool.inc.php` | High
|
||||
22 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
|
||||
23 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
|
||||
24 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
25 | File | `/login` | Low
|
||||
26 | File | `/module/module_frame/index.php` | High
|
||||
27 | File | `/notice-edit.php` | High
|
||||
28 | File | `/nova/bin/sniffer` | High
|
||||
29 | File | `/proc/pid/syscall` | High
|
||||
30 | File | `/product_list.php` | High
|
||||
31 | File | `/rest/api/2/user/picker` | High
|
||||
32 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
|
||||
33 | File | `/services/details.asp` | High
|
||||
34 | File | `/src/core/controllers/cm.php` | High
|
||||
35 | File | `/storage/app/media/evil.svg` | High
|
||||
36 | File | `/transmission/web/` | High
|
||||
37 | ... | ... | ...
|
||||
|
||||
There are 316 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 318 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -121,9 +121,10 @@ ID | Type | Indicator | Confidence
|
|||
33 | File | `add_vhost.php` | High
|
||||
34 | File | `admin.php` | Medium
|
||||
35 | File | `admin/conf_users_edit.php` | High
|
||||
36 | ... | ... | ...
|
||||
36 | File | `admin/default.asp` | High
|
||||
37 | ... | ... | ...
|
||||
|
||||
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 315 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,55 +1,55 @@
|
|||
# Cardinal RAT - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cardinal RAT](https://vuldb.com/?actor.cardinal_rat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cardinal RAT](https://vuldb.com/?actor.cardinal_rat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cardinal_rat](https://vuldb.com/?actor.cardinal_rat)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cardinal_rat](https://vuldb.com/?actor.cardinal_rat)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Cardinal RAT:
|
||||
The following _campaigns_ are known and can be associated with Cardinal RAT:
|
||||
|
||||
* Cardinal RAT
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cardinal RAT:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cardinal RAT:
|
||||
|
||||
* US
|
||||
* CR
|
||||
* AR
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CR](https://vuldb.com/?country.cr)
|
||||
* [AR](https://vuldb.com/?country.ar)
|
||||
* ...
|
||||
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cardinal RAT.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cardinal RAT.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 127.194.73.243 | - | High
|
||||
2 | 127.194.87.192 | - | High
|
||||
3 | 185.20.187.4 | 185.20.187.4.deltahost-ptr | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [127.194.73.243](https://vuldb.com/?ip.127.194.73.243) | - | Cardinal RAT | High
|
||||
2 | [127.194.87.192](https://vuldb.com/?ip.127.194.87.192) | - | Cardinal RAT | High
|
||||
3 | [185.20.187.4](https://vuldb.com/?ip.185.20.187.4) | 185.20.187.4.deltahost-ptr | Cardinal RAT | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cardinal RAT_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -65,17 +65,17 @@ ID | Type | Indicator | Confidence
|
|||
10 | File | `admin/web_config.php` | High
|
||||
11 | ... | ... | ...
|
||||
|
||||
There are 85 more IOA items available. Please use our online service to access the data.
|
||||
There are 85 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/cardinal-rat-sins-again-targets-israeli-fin-tech-firms/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,76 +1,85 @@
|
|||
# Careto - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Careto](https://vuldb.com/?actor.careto). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Careto](https://vuldb.com/?actor.careto). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.careto](https://vuldb.com/?actor.careto)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.careto](https://vuldb.com/?actor.careto)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Careto:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Careto:
|
||||
|
||||
* DE
|
||||
* US
|
||||
* AU
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Careto.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Careto.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 8.28.16.254 | - | High
|
||||
2 | 12.0.0.38 | - | High
|
||||
3 | 23.20.44.92 | ec2-23-20-44-92.compute-1.amazonaws.com | Medium
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [8.28.16.254](https://vuldb.com/?ip.8.28.16.254) | - | - | High
|
||||
2 | [12.0.0.38](https://vuldb.com/?ip.12.0.0.38) | - | - | High
|
||||
3 | [23.20.44.92](https://vuldb.com/?ip.23.20.44.92) | ec2-23-20-44-92.compute-1.amazonaws.com | - | Medium
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 13 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Careto. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Careto_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | 7PK Security Features | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Careto. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Careto. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/platform.cgi` | High
|
||||
2 | File | `/Status/wan_button_action.asp` | High
|
||||
3 | File | `/Users` | Low
|
||||
4 | File | `Aavmker4.sys` | Medium
|
||||
5 | File | `add_user.php` | Medium
|
||||
6 | File | `admin/app/physical/physical.php` | High
|
||||
7 | File | `admin/auto.def` | High
|
||||
8 | File | `app/admin/custom-fields/filter.php` | High
|
||||
9 | File | `auth-gss2.c` | Medium
|
||||
10 | File | `backoffice/login.asp` | High
|
||||
11 | File | `cisco/services/PhonecDirectory.php` | High
|
||||
12 | ... | ... | ...
|
||||
1 | File | `/api/update_setup` | High
|
||||
2 | File | `/APP_Installation.asp` | High
|
||||
3 | File | `/cgi-bin/live_api.cgi` | High
|
||||
4 | File | `/IISADMPWD` | Medium
|
||||
5 | File | `/php-fusion/infusions/shoutbox_panel/shoutbox_archive.php` | High
|
||||
6 | File | `/platform.cgi` | High
|
||||
7 | File | `/Status/wan_button_action.asp` | High
|
||||
8 | File | `/tmp/.uci/network` | High
|
||||
9 | File | `/uncpath/` | Medium
|
||||
10 | File | `/Users` | Low
|
||||
11 | File | `/usr/` | Low
|
||||
12 | File | `Aavmker4.sys` | Medium
|
||||
13 | File | `add_user.php` | Medium
|
||||
14 | File | `admin/app/physical/physical.php` | High
|
||||
15 | File | `admin/auto.def` | High
|
||||
16 | File | `api/settings/values` | High
|
||||
17 | File | `app/admin/custom-fields/filter.php` | High
|
||||
18 | File | `appfeed.c` | Medium
|
||||
19 | File | `ashmem.c` | Medium
|
||||
20 | File | `auth-gss2.c` | Medium
|
||||
21 | ... | ... | ...
|
||||
|
||||
There are 95 more IOA items available. Please use our online service to access the data.
|
||||
There are 173 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=unveilingthemask_v1.0.pdf&y=2014
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,42 +1,42 @@
|
|||
# Carrotbat - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Carrotbat](https://vuldb.com/?actor.carrotbat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Carrotbat](https://vuldb.com/?actor.carrotbat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.carrotbat](https://vuldb.com/?actor.carrotbat)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.carrotbat](https://vuldb.com/?actor.carrotbat)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Carrotbat:
|
||||
The following _campaigns_ are known and can be associated with Carrotbat:
|
||||
|
||||
* Fractured Block
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Carrotbat:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Carrotbat:
|
||||
|
||||
* CN
|
||||
* US
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Carrotbat.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Carrotbat.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 61.14.210.72 | former-enews-out.businessinsider.org.uk | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [61.14.210.72](https://vuldb.com/?ip.61.14.210.72) | former-enews-out.businessinsider.org.uk | Fractured Block | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Carrotbat_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1068 | Execution with Unnecessary Privileges | High
|
||||
2 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
2 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -45,17 +45,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `auth-gss2.c` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 11 more IOA items available. Please use our online service to access the data.
|
||||
There are 12 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=TheFracturedBlockCampaign_CARROTBATUsedtoDeliverMalwareTargetingSoutheastAsia-PaloAltoNetworksBlog.pdf&y=2018
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# CeidPageLock - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CeidPageLock](https://vuldb.com/?actor.ceidpagelock). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CeidPageLock](https://vuldb.com/?actor.ceidpagelock). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ceidpagelock](https://vuldb.com/?actor.ceidpagelock)
|
||||
|
||||
|
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CeidPageLock:
|
||||
|
||||
* CN
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,12 +16,12 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 42.51.223.86 | - | - | High
|
||||
2 | 118.193.211.11 | - | - | High
|
||||
1 | [42.51.223.86](https://vuldb.com/?ip.42.51.223.86) | - | - | High
|
||||
2 | [118.193.211.11](https://vuldb.com/?ip.118.193.211.11) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CeidPageLock. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CeidPageLock_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,33 +1,33 @@
|
|||
# Center-1 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-1](https://vuldb.com/?actor.center-1). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-1](https://vuldb.com/?actor.center-1). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.center-1](https://vuldb.com/?actor.center-1)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.center-1](https://vuldb.com/?actor.center-1)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-1:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-1:
|
||||
|
||||
* IT
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Center-1.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Center-1.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 80.211.37.240 | host240-37-211-80.serverdedicati.aruba.it | High
|
||||
2 | 161.35.38.8 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [80.211.37.240](https://vuldb.com/?ip.80.211.37.240) | host240-37-211-80.serverdedicati.aruba.it | - | High
|
||||
2 | [161.35.38.8](https://vuldb.com/?ip.161.35.38.8) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,46 +1,46 @@
|
|||
# Center-2 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-2](https://vuldb.com/?actor.center-2). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-2](https://vuldb.com/?actor.center-2). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.center-2](https://vuldb.com/?actor.center-2)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.center-2](https://vuldb.com/?actor.center-2)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-2:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-2:
|
||||
|
||||
* FR
|
||||
* IT
|
||||
* US
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Center-2.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Center-2.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 80.211.35.111 | host111-35-211-80.serverdedicati.aruba.it | High
|
||||
2 | 89.40.115.27 | host27-115-40-89.static.arubacloud.fr | High
|
||||
3 | 134.122.68.221 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [80.211.35.111](https://vuldb.com/?ip.80.211.35.111) | host111-35-211-80.serverdedicati.aruba.it | - | High
|
||||
2 | [89.40.115.27](https://vuldb.com/?ip.89.40.115.27) | host27-115-40-89.static.arubacloud.fr | - | High
|
||||
3 | [134.122.68.221](https://vuldb.com/?ip.134.122.68.221) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Center-2. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Center-2_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Center-2. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Center-2. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -54,17 +54,17 @@ ID | Type | Indicator | Confidence
|
|||
8 | File | `action/addproject.php` | High
|
||||
9 | ... | ... | ...
|
||||
|
||||
There are 68 more IOA items available. Please use our online service to access the data.
|
||||
There are 69 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -44,7 +44,7 @@ There are 66 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Cerber_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cerber_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -85,7 +85,7 @@ ID | Type | Indicator | Confidence
|
|||
22 | File | `content/unity-api.js` | High
|
||||
23 | ... | ... | ...
|
||||
|
||||
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 191 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Cerberus - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cerberus](https://vuldb.com/?actor.cerberus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cerberus](https://vuldb.com/?actor.cerberus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cerberus](https://vuldb.com/?actor.cerberus)
|
||||
|
||||
|
@ -10,7 +10,7 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 91.210.169.114 | 490023-cc75354.tmweb.ru | - | High
|
||||
1 | [91.210.169.114](https://vuldb.com/?ip.91.210.169.114) | 490023-cc75354.tmweb.ru | - | High
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,60 +1,90 @@
|
|||
# CetaRAT - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CetaRAT](https://vuldb.com/?actor.cetarat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CetaRAT](https://vuldb.com/?actor.cetarat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cetarat](https://vuldb.com/?actor.cetarat)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cetarat](https://vuldb.com/?actor.cetarat)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CetaRAT:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CetaRAT:
|
||||
|
||||
* US
|
||||
* NL
|
||||
* SA
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [SA](https://vuldb.com/?country.sa)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CetaRAT.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CetaRAT.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 109.236.85.152 | customer.worldstream.nl | High
|
||||
2 | 161.97.142.96 | vmi745943.contaboserver.net | High
|
||||
3 | 164.68.104.126 | vmd76303.contaboserver.net | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [109.236.85.152](https://vuldb.com/?ip.109.236.85.152) | customer.worldstream.nl | - | High
|
||||
2 | [161.97.142.96](https://vuldb.com/?ip.161.97.142.96) | vmi745943.contaboserver.net | - | High
|
||||
3 | [164.68.104.126](https://vuldb.com/?ip.164.68.104.126) | vmd76303.contaboserver.net | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CetaRAT_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `adclick.php` | Medium
|
||||
2 | File | `data/gbconfiguration.dat` | High
|
||||
3 | File | `exit.php` | Medium
|
||||
4 | ... | ... | ...
|
||||
1 | File | `.travis.yml` | Medium
|
||||
2 | File | `/.env` | Low
|
||||
3 | File | `/admin.php` | Medium
|
||||
4 | File | `/admin/config.php?display=disa&view=form` | High
|
||||
5 | File | `/category_view.php` | High
|
||||
6 | File | `/dev/kmem` | Medium
|
||||
7 | File | `/file?action=download&file` | High
|
||||
8 | File | `/medical/inventories.php` | High
|
||||
9 | File | `/monitoring` | Medium
|
||||
10 | File | `/NAGErrors` | Medium
|
||||
11 | File | `/plugins/servlet/audit/resource` | High
|
||||
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
13 | File | `/proc/ioports` | High
|
||||
14 | File | `/replication` | Medium
|
||||
15 | File | `/RestAPI` | Medium
|
||||
16 | File | `/tmp` | Low
|
||||
17 | File | `/tmp/speedtest_urls.xml` | High
|
||||
18 | File | `/uncpath/` | Medium
|
||||
19 | File | `/var/log/nginx` | High
|
||||
20 | File | `/wp-admin/admin.php` | High
|
||||
21 | File | `adclick.php` | Medium
|
||||
22 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
23 | File | `admin/index.php` | High
|
||||
24 | File | `admin\model\catalog\download.php` | High
|
||||
25 | File | `apcupsd.pid` | Medium
|
||||
26 | File | `api/sms/send-sms` | High
|
||||
27 | File | `api/v1/alarms` | High
|
||||
28 | File | `application/controller/InstallerController.php` | High
|
||||
29 | ... | ... | ...
|
||||
|
||||
There are 10 more IOA items available. Please use our online service to access the data.
|
||||
There are 249 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -33,7 +33,7 @@ There are 26 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _ChaChi_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _ChaChi_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -61,26 +61,26 @@ ID | Type | Indicator | Confidence
|
|||
9 | File | `/forum/away.php` | High
|
||||
10 | File | `/get_getnetworkconf.cgi` | High
|
||||
11 | File | `/horde/util/go.php` | High
|
||||
12 | File | `/opensis/modules/users/Staff.php` | High
|
||||
13 | File | `/plugins/servlet/gadgets/makeRequest` | High
|
||||
14 | File | `/req_password_user.php` | High
|
||||
15 | File | `/show_news.php` | High
|
||||
16 | File | `/tmp` | Low
|
||||
17 | File | `/uncpath/` | Medium
|
||||
18 | File | `/Uploads` | Medium
|
||||
19 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
|
||||
20 | File | `/WEB-INF/web.xml` | High
|
||||
21 | File | `/webconsole/APIController` | High
|
||||
22 | File | `AccountStatus.jsp` | High
|
||||
23 | File | `add.php` | Low
|
||||
24 | File | `addentry.php` | Medium
|
||||
25 | File | `admin.htm` | Medium
|
||||
26 | File | `admin.php` | Medium
|
||||
27 | File | `admin/article_category.php?rec=update` | High
|
||||
28 | File | `admin/config/confmgr.php` | High
|
||||
12 | File | `/nova/bin/detnet` | High
|
||||
13 | File | `/opensis/modules/users/Staff.php` | High
|
||||
14 | File | `/plugins/servlet/gadgets/makeRequest` | High
|
||||
15 | File | `/req_password_user.php` | High
|
||||
16 | File | `/show_news.php` | High
|
||||
17 | File | `/tmp` | Low
|
||||
18 | File | `/uncpath/` | Medium
|
||||
19 | File | `/Uploads` | Medium
|
||||
20 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
|
||||
21 | File | `/WEB-INF/web.xml` | High
|
||||
22 | File | `/webconsole/APIController` | High
|
||||
23 | File | `AccountStatus.jsp` | High
|
||||
24 | File | `add.php` | Low
|
||||
25 | File | `addentry.php` | Medium
|
||||
26 | File | `admin.htm` | Medium
|
||||
27 | File | `admin.php` | Medium
|
||||
28 | File | `admin/article_category.php?rec=update` | High
|
||||
29 | ... | ... | ...
|
||||
|
||||
There are 244 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 245 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Chalubo. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chalubo_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -105,7 +105,7 @@ ID | Type | Indicator | Confidence
|
|||
30 | File | `admin.php` | Medium
|
||||
31 | ... | ... | ...
|
||||
|
||||
There are 262 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 261 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
# ChessMaster - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ChessMaster](https://vuldb.com/?actor.chessmaster). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ChessMaster](https://vuldb.com/?actor.chessmaster). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.chessmaster](https://vuldb.com/?actor.chessmaster)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.chessmaster](https://vuldb.com/?actor.chessmaster)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of ChessMaster.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ChessMaster.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 62.75.197.131 | static-ip-62-75-197-131.inaddr.ip-pool.com | High
|
||||
2 | 89.18.27.159 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [62.75.197.131](https://vuldb.com/?ip.62.75.197.131) | static-ip-62-75-197-131.inaddr.ip-pool.com | - | High
|
||||
2 | [89.18.27.159](https://vuldb.com/?ip.89.18.27.159) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=ChessMaster%E2%80%99sNewStrategy_EvolvingToolsandTactics-TrendLabsSecurityIntelligenceBlog.pdf&y=2017
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -27,7 +27,7 @@ There are 16 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Chimera. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chimera_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -45,39 +45,42 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `./clients/client` | High
|
||||
2 | File | `/alumni/admin/ajax.php?action=save_settings` | High
|
||||
2 | File | `//` | Low
|
||||
3 | File | `/assets/ctx` | Medium
|
||||
4 | File | `/cgi-bin/luci` | High
|
||||
5 | File | `/cgi-bin/portal` | High
|
||||
6 | File | `/cimom` | Low
|
||||
7 | File | `/config/getuser` | High
|
||||
8 | File | `/forum/away.php` | High
|
||||
9 | File | `/gcp/roleset/*` | High
|
||||
10 | File | `/horde/util/go.php` | High
|
||||
11 | File | `/hostapd` | Medium
|
||||
12 | File | `/IISADMPWD` | Medium
|
||||
13 | File | `/iisadmpwd` | Medium
|
||||
14 | File | `/include/chart_generator.php` | High
|
||||
15 | File | `/MTFWU` | Low
|
||||
16 | File | `/my_photo_gallery/image.php` | High
|
||||
17 | File | `/public/login.htm` | High
|
||||
18 | File | `/public/plugins/` | High
|
||||
19 | File | `/rest/api/1.0/render` | High
|
||||
20 | File | `/rest/api/latest/user/avatar/temporary` | High
|
||||
21 | File | `/secure/admin/ConfigureBatching!default.jspa` | High
|
||||
22 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
23 | File | `/sm/api/v1/firewall/zone/services` | High
|
||||
24 | File | `/sys/attachment/uploaderServlet` | High
|
||||
25 | File | `/uncpath/` | Medium
|
||||
6 | File | `/config/getuser` | High
|
||||
7 | File | `/forum/away.php` | High
|
||||
8 | File | `/horde/util/go.php` | High
|
||||
9 | File | `/hostapd` | Medium
|
||||
10 | File | `/include/chart_generator.php` | High
|
||||
11 | File | `/MTFWU` | Low
|
||||
12 | File | `/my_photo_gallery/image.php` | High
|
||||
13 | File | `/ptms/classes/Users.php` | High
|
||||
14 | File | `/public/admin.php` | High
|
||||
15 | File | `/public/login.htm` | High
|
||||
16 | File | `/public/login.htm?errormsg=&loginurl=%22%3E%3Csvg%20onload=prompt%28/XSS/%29%3E` | High
|
||||
17 | File | `/public/plugins/` | High
|
||||
18 | File | `/rest/api/1.0/render` | High
|
||||
19 | File | `/rest/api/latest/user/avatar/temporary` | High
|
||||
20 | File | `/s/` | Low
|
||||
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
22 | File | `/sm/api/v1/firewall/zone/services` | High
|
||||
23 | File | `/sys/attachment/uploaderServlet` | High
|
||||
24 | File | `/uncpath/` | Medium
|
||||
25 | File | `/user-utils/users/md5.json` | High
|
||||
26 | File | `/userRpm/popupSiteSurveyRpm.html` | High
|
||||
27 | File | `/users/{id}` | Medium
|
||||
28 | File | `/usr/bin/pkexec` | High
|
||||
29 | File | `/wp-admin` | Medium
|
||||
30 | File | `/wp-admin/admin-ajax.php` | High
|
||||
31 | File | `/wp-json` | Medium
|
||||
32 | ... | ... | ...
|
||||
27 | File | `/usr/bin/pkexec` | High
|
||||
28 | File | `/wp-admin/admin-ajax.php` | High
|
||||
29 | File | `/wp-json` | Medium
|
||||
30 | File | `102/tcp` | Low
|
||||
31 | File | `accountrecoveryendpoint/recoverpassword.do` | High
|
||||
32 | File | `admin.php` | Medium
|
||||
33 | File | `admin.remository.php` | High
|
||||
34 | File | `admin/conf_users_edit.php` | High
|
||||
35 | ... | ... | ...
|
||||
|
||||
There are 268 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 299 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -20,7 +20,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
|
|
@ -31,7 +31,7 @@ There are 17 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Chthonic_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chthonic_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Group:
|
||||
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [SV](https://vuldb.com/?country.sv)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
There are 7 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -35,12 +35,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -50,29 +50,32 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/account/login` | High
|
||||
2 | File | `/admin.back` | Medium
|
||||
3 | File | `/admin.html?do=user&act=add` | High
|
||||
4 | File | `/admin/customers.php?page=1&cID` | High
|
||||
5 | File | `/admin/link/link_ok.php` | High
|
||||
3 | File | `/admin/customers.php?page=1&cID` | High
|
||||
4 | File | `/admin/link/link_ok.php` | High
|
||||
5 | File | `/admin/show.php` | High
|
||||
6 | File | `/administrator/components/menu/` | High
|
||||
7 | File | `/controller/CommentAdminController.java` | High
|
||||
8 | File | `/event-management/index.php` | High
|
||||
9 | File | `/goform/change_password_process` | High
|
||||
10 | File | `/goform/edit_opt` | High
|
||||
11 | File | `/goform/SetPptpServerCfg` | High
|
||||
12 | File | `/hdf5/src/H5Fint.c` | High
|
||||
13 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
14 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
15 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
16 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
|
||||
17 | File | `/src/njs_object.c` | High
|
||||
18 | File | `/template/unzip.do` | High
|
||||
19 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
20 | File | `AccountManagerService.java` | High
|
||||
21 | File | `account_sponsor_page.php` | High
|
||||
22 | File | `act.php` | Low
|
||||
23 | ... | ... | ...
|
||||
8 | File | `/data/sqldata` | High
|
||||
9 | File | `/feedback/post/` | High
|
||||
10 | File | `/goform/change_password_process` | High
|
||||
11 | File | `/goform/edit_opt` | High
|
||||
12 | File | `/goform/SetPptpServerCfg` | High
|
||||
13 | File | `/hdf5/src/H5Fint.c` | High
|
||||
14 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
15 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
16 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
17 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
|
||||
18 | File | `/setting/NTPSyncWithHost` | High
|
||||
19 | File | `/src/njs_object.c` | High
|
||||
20 | File | `/template/unzip.do` | High
|
||||
21 | File | `/u8sl/WebHelp` | High
|
||||
22 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
23 | File | `AccountManagerService.java` | High
|
||||
24 | File | `account_sponsor_page.php` | High
|
||||
25 | File | `act.php` | Low
|
||||
26 | ... | ... | ...
|
||||
|
||||
There are 193 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
|
||||
|
||||
* [SV](https://vuldb.com/?country.sv)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [SV](https://vuldb.com/?country.sv)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
There are 10 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -23,10 +23,11 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.82.140.91](https://vuldb.com/?ip.23.82.140.91) | - | - | High
|
||||
2 | [23.108.57.108](https://vuldb.com/?ip.23.108.57.108) | - | - | High
|
||||
3 | [62.128.111.176](https://vuldb.com/?ip.62.128.111.176) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
3 | [45.134.26.174](https://vuldb.com/?ip.45.134.26.174) | - | - | High
|
||||
4 | [45.144.29.185](https://vuldb.com/?ip.45.144.29.185) | master.pisyandriy.com | - | High
|
||||
5 | ... | ... | ... | ...
|
||||
|
||||
There are 9 more IOC items available. Please use our online service to access the data.
|
||||
There are 15 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -35,11 +36,11 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1222 | CWE-275 | Permission Issues | High
|
||||
2 | T1068 | CWE-250, CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -47,78 +48,80 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.ssh/authorized_keys` | High
|
||||
2 | File | `/?admin/user.html` | High
|
||||
3 | File | `/admin/success_story.php` | High
|
||||
4 | File | `/configuration/httpListenerEdit.jsf` | High
|
||||
5 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
6 | File | `/movie-portal-script/movie.php` | High
|
||||
7 | File | `/notice-edit.php` | High
|
||||
8 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
|
||||
9 | File | `/tmp` | Low
|
||||
10 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
11 | File | `4.2.0.CP08` | Medium
|
||||
12 | File | `account.asp` | Medium
|
||||
13 | File | `acerctrl.ocx` | Medium
|
||||
14 | File | `activate.php` | Medium
|
||||
15 | File | `add.php` | Low
|
||||
16 | File | `addressbook/csv_import.php` | High
|
||||
17 | File | `adm/krgourl.php` | High
|
||||
18 | File | `admin.php` | Medium
|
||||
19 | File | `admin/admin.php` | High
|
||||
20 | File | `admin/adminaddeditdetails.php` | High
|
||||
21 | File | `admin/ajaxsave.php` | High
|
||||
22 | File | `admin/auth.php` | High
|
||||
23 | File | `admin/config.php` | High
|
||||
24 | File | `admin/images.php` | High
|
||||
25 | File | `ADMIN/loginaction.php` | High
|
||||
26 | File | `admin/member_details.php` | High
|
||||
27 | File | `admin/preview.php` | High
|
||||
28 | File | `ajax/addComment.php` | High
|
||||
29 | File | `App_Data/sb.mdb` | High
|
||||
30 | File | `archive_read_support_format_rar5.c` | High
|
||||
31 | File | `article.php` | Medium
|
||||
32 | File | `asp:.jpg` | Medium
|
||||
33 | File | `auth-options.c` | High
|
||||
34 | File | `auth2-gss.c` | Medium
|
||||
35 | File | `aviso.php` | Medium
|
||||
36 | File | `backup.php` | Medium
|
||||
37 | File | `bios.php` | Medium
|
||||
38 | File | `blanko.preview.php` | High
|
||||
39 | File | `blocks.php` | Medium
|
||||
40 | File | `breadcrumbs_create.php` | High
|
||||
41 | File | `browse.php` | Medium
|
||||
42 | File | `browse_ladies.php` | High
|
||||
43 | File | `burl.c` | Low
|
||||
44 | File | `cadena_ofertas_ext.php` | High
|
||||
45 | File | `cal_popup.php` | High
|
||||
46 | File | `category-delete.php` | High
|
||||
47 | File | `category.php` | Medium
|
||||
48 | File | `CFM File Handler` | High
|
||||
49 | File | `cgi-bin/awstats.pl` | High
|
||||
50 | File | `Change-password.php` | High
|
||||
51 | File | `charts.php` | Medium
|
||||
52 | File | `classified.php` | High
|
||||
53 | File | `client.c` | Medium
|
||||
54 | File | `cmd.php` | Low
|
||||
55 | File | `comment.php` | Medium
|
||||
56 | File | `comments.php` | Medium
|
||||
57 | File | `config.php` | Medium
|
||||
58 | File | `controller/fetchpwd.php` | High
|
||||
59 | File | `core/stack/l2cap/l2cap_sm.c` | High
|
||||
60 | File | `country_escorts.php` | High
|
||||
61 | File | `cource.php` | Medium
|
||||
62 | ... | ... | ...
|
||||
1 | File | `/?admin/user.html` | High
|
||||
2 | File | `/admin/success_story.php` | High
|
||||
3 | File | `/configuration/httpListenerEdit.jsf` | High
|
||||
4 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
5 | File | `/movie-portal-script/movie.php` | High
|
||||
6 | File | `/notice-edit.php` | High
|
||||
7 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
|
||||
8 | File | `/tmp` | Low
|
||||
9 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
10 | File | `4.2.0.CP08` | Medium
|
||||
11 | File | `account.asp` | Medium
|
||||
12 | File | `acerctrl.ocx` | Medium
|
||||
13 | File | `activate.php` | Medium
|
||||
14 | File | `add.php` | Low
|
||||
15 | File | `adm/krgourl.php` | High
|
||||
16 | File | `admin.php` | Medium
|
||||
17 | File | `admin/admin.php` | High
|
||||
18 | File | `admin/adminaddeditdetails.php` | High
|
||||
19 | File | `admin/ajaxsave.php` | High
|
||||
20 | File | `admin/auth.php` | High
|
||||
21 | File | `admin/images.php` | High
|
||||
22 | File | `admin/import/class-import-settings.php` | High
|
||||
23 | File | `ADMIN/loginaction.php` | High
|
||||
24 | File | `admin/member_details.php` | High
|
||||
25 | File | `admin/preview.php` | High
|
||||
26 | File | `ajax/addComment.php` | High
|
||||
27 | File | `and/or` | Low
|
||||
28 | File | `arch/powerpc/kernel/entry_64.S` | High
|
||||
29 | File | `archive_read_support_format_rar5.c` | High
|
||||
30 | File | `article.php` | Medium
|
||||
31 | File | `asp:.jpg` | Medium
|
||||
32 | File | `auth2-gss.c` | Medium
|
||||
33 | File | `backup.php` | Medium
|
||||
34 | File | `bios.php` | Medium
|
||||
35 | File | `blanko.preview.php` | High
|
||||
36 | File | `block/bfq-iosched.c` | High
|
||||
37 | File | `browse.php` | Medium
|
||||
38 | File | `browse_ladies.php` | High
|
||||
39 | File | `burl.c` | Low
|
||||
40 | File | `cadena_ofertas_ext.php` | High
|
||||
41 | File | `cal_popup.php` | High
|
||||
42 | File | `category-delete.php` | High
|
||||
43 | File | `category.php` | Medium
|
||||
44 | File | `CFM File Handler` | High
|
||||
45 | File | `cgi-bin/awstats.pl` | High
|
||||
46 | File | `Change-password.php` | High
|
||||
47 | File | `charts.php` | Medium
|
||||
48 | File | `chat.php` | Medium
|
||||
49 | File | `classified.php` | High
|
||||
50 | File | `comments.php` | Medium
|
||||
51 | File | `config.php` | Medium
|
||||
52 | File | `core/stack/l2cap/l2cap_sm.c` | High
|
||||
53 | File | `country_escorts.php` | High
|
||||
54 | File | `cource.php` | Medium
|
||||
55 | File | `Crypt32.dll` | Medium
|
||||
56 | File | `dapur/index.php` | High
|
||||
57 | File | `default.asp` | Medium
|
||||
58 | ... | ... | ...
|
||||
|
||||
There are 547 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 509 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/
|
||||
* https://isc.sans.edu/forums/diary/Attackers+Exploiting+WebLogic+Servers+via+CVE202014882+to+install+Cobalt+Strike/26752/
|
||||
* https://isc.sans.edu/forums/diary/Example+of+Cobalt+Strike+from+Emotet+infection/28318/
|
||||
* https://isc.sans.edu/forums/diary/Excel+spreadsheets+push+SystemBC+malware/27060/
|
||||
* https://isc.sans.edu/forums/diary/June+2021+Forensic+Contest+Answers+and+Analysis/27582/
|
||||
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike+and+VNC+activity/28448/
|
||||
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike/27158/
|
||||
* https://research.checkpoint.com/2019/cobalt-group-returns-to-kazakhstan/
|
||||
* https://securelist.com/owowa-credential-stealer-and-remote-access/105219/
|
||||
* https://twitter.com/malware_traffic/status/1400876426497253379
|
||||
* https://twitter.com/malware_traffic/status/1415740795622248452
|
||||
* https://twitter.com/Unit42_Intel/status/1392174941181812737
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# CoinMiner - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinMiner](https://vuldb.com/?actor.coinminer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinMiner](https://vuldb.com/?actor.coinminer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.coinminer](https://vuldb.com/?actor.coinminer)
|
||||
|
||||
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinMiner:
|
||||
|
||||
* DE
|
||||
* US
|
||||
* ES
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* ...
|
||||
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,24 +21,25 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 5.196.13.29 | 29.ip-5-196-13.eu | - | High
|
||||
2 | 5.196.23.240 | 240.ip-5-196-23.eu | - | High
|
||||
3 | 13.107.21.200 | - | - | High
|
||||
4 | 18.210.126.40 | ec2-18-210-126-40.compute-1.amazonaws.com | - | Medium
|
||||
5 | 23.21.48.44 | ec2-23-21-48-44.compute-1.amazonaws.com | - | Medium
|
||||
6 | 23.21.76.253 | ec2-23-21-76-253.compute-1.amazonaws.com | - | Medium
|
||||
7 | 23.21.126.66 | ec2-23-21-126-66.compute-1.amazonaws.com | - | Medium
|
||||
8 | 23.21.140.41 | ec2-23-21-140-41.compute-1.amazonaws.com | - | Medium
|
||||
9 | 23.21.252.4 | ec2-23-21-252-4.compute-1.amazonaws.com | - | Medium
|
||||
10 | 49.12.80.38 | static.38.80.12.49.clients.your-server.de | - | High
|
||||
11 | 49.12.80.40 | static.40.80.12.49.clients.your-server.de | - | High
|
||||
12 | ... | ... | ... | ...
|
||||
1 | [5.196.13.29](https://vuldb.com/?ip.5.196.13.29) | 29.ip-5-196-13.eu | - | High
|
||||
2 | [5.196.23.240](https://vuldb.com/?ip.5.196.23.240) | 240.ip-5-196-23.eu | - | High
|
||||
3 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
|
||||
4 | [18.210.126.40](https://vuldb.com/?ip.18.210.126.40) | ec2-18-210-126-40.compute-1.amazonaws.com | - | Medium
|
||||
5 | [23.21.48.44](https://vuldb.com/?ip.23.21.48.44) | ec2-23-21-48-44.compute-1.amazonaws.com | - | Medium
|
||||
6 | [23.21.76.253](https://vuldb.com/?ip.23.21.76.253) | ec2-23-21-76-253.compute-1.amazonaws.com | - | Medium
|
||||
7 | [23.21.126.66](https://vuldb.com/?ip.23.21.126.66) | ec2-23-21-126-66.compute-1.amazonaws.com | - | Medium
|
||||
8 | [23.21.140.41](https://vuldb.com/?ip.23.21.140.41) | ec2-23-21-140-41.compute-1.amazonaws.com | - | Medium
|
||||
9 | [23.21.252.4](https://vuldb.com/?ip.23.21.252.4) | ec2-23-21-252-4.compute-1.amazonaws.com | - | Medium
|
||||
10 | [49.12.80.38](https://vuldb.com/?ip.49.12.80.38) | static.38.80.12.49.clients.your-server.de | - | High
|
||||
11 | [49.12.80.40](https://vuldb.com/?ip.49.12.80.40) | static.40.80.12.49.clients.your-server.de | - | High
|
||||
12 | [50.19.96.218](https://vuldb.com/?ip.50.19.96.218) | ec2-50-19-96-218.compute-1.amazonaws.com | - | Medium
|
||||
13 | ... | ... | ... | ...
|
||||
|
||||
There are 46 more IOC items available. Please use our online service to access the data.
|
||||
There are 48 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CoinMiner. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CoinMiner_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -47,7 +48,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -61,45 +62,46 @@ ID | Type | Indicator | Confidence
|
|||
4 | File | `.tin` | Low
|
||||
5 | File | `/aux` | Low
|
||||
6 | File | `/coreframe/app/guestbook/myissue.php` | High
|
||||
7 | File | `/data/nvram` | Medium
|
||||
8 | File | `/icingaweb2/navigation/add` | High
|
||||
9 | File | `/root/.keeper/` | High
|
||||
10 | File | `/sbin/conf.d/SuSEconfig.javarunt` | High
|
||||
11 | File | `/search-result/` | High
|
||||
12 | File | `/usr/bin/sonia` | High
|
||||
13 | File | `/var/log/nginx` | High
|
||||
14 | File | `/var/spool/fax/outgoing/.last_run` | High
|
||||
15 | File | `95.php` | Low
|
||||
16 | File | `123flashchat.php` | High
|
||||
17 | File | `action.php` | Medium
|
||||
18 | File | `Active Browser Profile` | High
|
||||
19 | File | `adb/adb_client.c` | High
|
||||
20 | File | `addons/mod_media/body.php` | High
|
||||
21 | File | `admin.php` | Medium
|
||||
22 | File | `admin/profile_settings_net.html` | High
|
||||
23 | File | `Administrator/add_pictures.php` | High
|
||||
24 | File | `af_netlink.c` | Medium
|
||||
25 | File | `aide.php3` | Medium
|
||||
26 | File | `aim/icq` | Low
|
||||
27 | File | `ajax.php` | Medium
|
||||
28 | File | `akocomment.php` | High
|
||||
29 | File | `album.php` | Medium
|
||||
30 | File | `allmanageup.pl` | High
|
||||
31 | File | `apache2/modsecurity.c` | High
|
||||
32 | File | `ardeaCore/lib/core/ardeaInit.php` | High
|
||||
33 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
34 | File | `attachment_send.php` | High
|
||||
35 | File | `b2edit.showposts.php` | High
|
||||
36 | File | `bar.phtml` | Medium
|
||||
37 | File | `bios.php` | Medium
|
||||
38 | File | `cadastro_usuario.php` | High
|
||||
39 | File | `cartman.php` | Medium
|
||||
40 | File | `cdf.c` | Low
|
||||
41 | File | `cgi-bin/module/sysmanager/admin/SYSAdminUserDialog` | High
|
||||
42 | File | `cgi/actions.py` | High
|
||||
43 | ... | ... | ...
|
||||
7 | File | `/icingaweb2/navigation/add` | High
|
||||
8 | File | `/root/.keeper/` | High
|
||||
9 | File | `/sbin/conf.d/SuSEconfig.javarunt` | High
|
||||
10 | File | `/search-result/` | High
|
||||
11 | File | `/usr/bin/sonia` | High
|
||||
12 | File | `/var/log/nginx` | High
|
||||
13 | File | `/var/spool/fax/outgoing/.last_run` | High
|
||||
14 | File | `95.php` | Low
|
||||
15 | File | `123flashchat.php` | High
|
||||
16 | File | `action.php` | Medium
|
||||
17 | File | `Active Browser Profile` | High
|
||||
18 | File | `adb/adb_client.c` | High
|
||||
19 | File | `addons/mod_media/body.php` | High
|
||||
20 | File | `admin.php` | Medium
|
||||
21 | File | `admin/profile_settings_net.html` | High
|
||||
22 | File | `af.cgi/alienform.cgi` | High
|
||||
23 | File | `af_netlink.c` | Medium
|
||||
24 | File | `aide.php3` | Medium
|
||||
25 | File | `aim/icq` | Low
|
||||
26 | File | `ajax.php` | Medium
|
||||
27 | File | `akocomment.php` | High
|
||||
28 | File | `album.php` | Medium
|
||||
29 | File | `allmanageup.pl` | High
|
||||
30 | File | `apache2/modsecurity.c` | High
|
||||
31 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
32 | File | `attachment_send.php` | High
|
||||
33 | File | `b2edit.showposts.php` | High
|
||||
34 | File | `bar.phtml` | Medium
|
||||
35 | File | `bitmap/bdfread.c` | High
|
||||
36 | File | `cadastro_usuario.php` | High
|
||||
37 | File | `cartman.php` | Medium
|
||||
38 | File | `cdf.c` | Low
|
||||
39 | File | `cgi-bin/module/sysmanager/admin/SYSAdminUserDialog` | High
|
||||
40 | File | `cgi/actions.py` | High
|
||||
41 | File | `cgiproc` | Low
|
||||
42 | File | `classifieds.cgi` | High
|
||||
43 | File | `cmd.php` | Low
|
||||
44 | ... | ... | ...
|
||||
|
||||
There are 376 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 385 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -113,6 +115,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://blog.talosintelligence.com/2021/06/threat-roundup-0604-0611.html
|
||||
* https://blog.talosintelligence.com/2021/06/threat-roundup-0611-0617.html
|
||||
* https://blog.talosintelligence.com/2021/06/threat-roundup-0617-0624.html
|
||||
* https://isc.sans.edu/forums/diary/CoinMiners+searching+for+hosts/24364/
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -1,46 +1,46 @@
|
|||
# CoinStomp - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinStomp](https://vuldb.com/?actor.coinstomp). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinStomp](https://vuldb.com/?actor.coinstomp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.coinstomp](https://vuldb.com/?actor.coinstomp)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.coinstomp](https://vuldb.com/?actor.coinstomp)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinStomp:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinStomp:
|
||||
|
||||
* US
|
||||
* RU
|
||||
* CN
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CoinStomp.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CoinStomp.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 106.53.115.114 | - | High
|
||||
2 | 109.234.36.173 | host-109-234-36-173.hosted-by-vdsina.ru | High
|
||||
3 | 205.185.113.151 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [106.53.115.114](https://vuldb.com/?ip.106.53.115.114) | - | - | High
|
||||
2 | [109.234.36.173](https://vuldb.com/?ip.109.234.36.173) | host-109-234-36-173.hosted-by-vdsina.ru | - | High
|
||||
3 | [205.185.113.151](https://vuldb.com/?ip.205.185.113.151) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CoinStomp_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -89,17 +89,17 @@ ID | Type | Indicator | Confidence
|
|||
43 | File | `collection.class.php` | High
|
||||
44 | ... | ... | ...
|
||||
|
||||
There are 385 more IOA items available. Please use our online service to access the data.
|
||||
There are 384 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.cadosecurity.com/coinstomp-malware-family-targets-asian-cloud-service-providers/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,56 +1,57 @@
|
|||
# Comnie - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Comnie](https://vuldb.com/?actor.comnie). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Comnie](https://vuldb.com/?actor.comnie). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.comnie](https://vuldb.com/?actor.comnie)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.comnie](https://vuldb.com/?actor.comnie)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Comnie:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Comnie:
|
||||
|
||||
* CN
|
||||
* IT
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Comnie.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Comnie.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 113.196.70.11 | 113.196.70.11.ll.static.sparqnet.net | High
|
||||
2 | 121.126.211.94 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [113.196.70.11](https://vuldb.com/?ip.113.196.70.11) | 113.196.70.11.ll.static.sparqnet.net | - | High
|
||||
2 | [121.126.211.94](https://vuldb.com/?ip.121.126.211.94) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Comnie. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Comnie_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Comnie. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Comnie. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `wp-includes/functions.php` | High
|
||||
2 | Argument | `filename` | Medium
|
||||
3 | Argument | `hotjar script` | High
|
||||
1 | File | `DAVServer.php` | High
|
||||
2 | File | `dl/dl_download.php` | High
|
||||
3 | File | `jtreelink/dialogs/links.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 1 more IOA items available. Please use our online service to access the data.
|
||||
There are 6 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=ComnieContinuestoTargetOrganizationsinEastAsia_PaloAltoNetworks.pdf&y=2018
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -69,55 +69,55 @@ ID | Type | Indicator | Confidence
|
|||
9 | File | `/filemanager/php/connector.php` | High
|
||||
10 | File | `/get_getnetworkconf.cgi` | High
|
||||
11 | File | `/HNAP1` | Low
|
||||
12 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
|
||||
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
14 | File | `/modx/manager/index.php` | High
|
||||
15 | File | `/osm/REGISTER.cmd` | High
|
||||
16 | File | `/product_list.php` | High
|
||||
17 | File | `/replication` | Medium
|
||||
18 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
19 | File | `/supervisor/procesa_carga.php` | High
|
||||
20 | File | `/type.php` | Medium
|
||||
21 | File | `/uncpath/` | Medium
|
||||
22 | File | `/usr/bin/pkexec` | High
|
||||
23 | File | `/zm/index.php` | High
|
||||
24 | File | `4.2.0.CP09` | Medium
|
||||
25 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
26 | File | `802dot1xclientcert.cgi` | High
|
||||
27 | File | `add.exe` | Low
|
||||
28 | File | `addentry.php` | Medium
|
||||
29 | File | `admin-ajax.php` | High
|
||||
30 | File | `admin.color.php` | High
|
||||
31 | File | `admin.cropcanvas.php` | High
|
||||
32 | File | `admin.joomlaradiov5.php` | High
|
||||
33 | File | `admin.php` | Medium
|
||||
34 | File | `admin.php?m=Food&a=addsave` | High
|
||||
35 | File | `admin/conf_users_edit.php` | High
|
||||
36 | File | `admin/index.php` | High
|
||||
37 | File | `admin/user.php` | High
|
||||
38 | File | `admin/write-post.php` | High
|
||||
39 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
40 | File | `admin_events.php` | High
|
||||
41 | File | `ajax_new_account.php` | High
|
||||
42 | File | `akocomments.php` | High
|
||||
43 | File | `allopass-error.php` | High
|
||||
44 | File | `announcement.php` | High
|
||||
45 | File | `app.php` | Low
|
||||
46 | File | `apply.cgi` | Medium
|
||||
47 | File | `archiver\index.php` | High
|
||||
48 | File | `artlinks.dispnew.php` | High
|
||||
49 | File | `auth.inc.php` | Medium
|
||||
50 | File | `authorization.do` | High
|
||||
51 | File | `awstats.pl` | Medium
|
||||
52 | File | `backoffice/login.asp` | High
|
||||
53 | File | `bb_usage_stats.php` | High
|
||||
54 | File | `binder.c` | Medium
|
||||
55 | File | `books.php` | Medium
|
||||
56 | File | `C:\Python27` | Medium
|
||||
57 | File | `C:\Windows\System32\config\SAM` | High
|
||||
12 | File | `/include/chart_generator.php` | High
|
||||
13 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
|
||||
14 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
15 | File | `/modx/manager/index.php` | High
|
||||
16 | File | `/osm/REGISTER.cmd` | High
|
||||
17 | File | `/product_list.php` | High
|
||||
18 | File | `/replication` | Medium
|
||||
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
20 | File | `/supervisor/procesa_carga.php` | High
|
||||
21 | File | `/type.php` | Medium
|
||||
22 | File | `/uncpath/` | Medium
|
||||
23 | File | `/usr/bin/pkexec` | High
|
||||
24 | File | `/zm/index.php` | High
|
||||
25 | File | `4.2.0.CP09` | Medium
|
||||
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
27 | File | `802dot1xclientcert.cgi` | High
|
||||
28 | File | `add.exe` | Low
|
||||
29 | File | `addentry.php` | Medium
|
||||
30 | File | `admin-ajax.php` | High
|
||||
31 | File | `admin.color.php` | High
|
||||
32 | File | `admin.cropcanvas.php` | High
|
||||
33 | File | `admin.joomlaradiov5.php` | High
|
||||
34 | File | `admin.php` | Medium
|
||||
35 | File | `admin.php?m=Food&a=addsave` | High
|
||||
36 | File | `admin/conf_users_edit.php` | High
|
||||
37 | File | `admin/index.php` | High
|
||||
38 | File | `admin/user.php` | High
|
||||
39 | File | `admin/write-post.php` | High
|
||||
40 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
41 | File | `admin_events.php` | High
|
||||
42 | File | `ajax_new_account.php` | High
|
||||
43 | File | `akocomments.php` | High
|
||||
44 | File | `allopass-error.php` | High
|
||||
45 | File | `announcement.php` | High
|
||||
46 | File | `app.php` | Low
|
||||
47 | File | `apply.cgi` | Medium
|
||||
48 | File | `archiver\index.php` | High
|
||||
49 | File | `artlinks.dispnew.php` | High
|
||||
50 | File | `auth.inc.php` | Medium
|
||||
51 | File | `authorization.do` | High
|
||||
52 | File | `awstats.pl` | Medium
|
||||
53 | File | `backoffice/login.asp` | High
|
||||
54 | File | `bb_usage_stats.php` | High
|
||||
55 | File | `binder.c` | Medium
|
||||
56 | File | `books.php` | Medium
|
||||
57 | File | `C:\Python27` | Medium
|
||||
58 | ... | ... | ...
|
||||
|
||||
There are 510 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 511 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 32 more country items available. Please use our online service to access the data.
|
||||
There are 31 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -106,44 +106,44 @@ ID | Type | Indicator | Confidence
|
|||
4 | File | `/admin/modules/system/custom_field.php` | High
|
||||
5 | File | `/bin/boa` | Medium
|
||||
6 | File | `/cgi-bin/wapopen` | High
|
||||
7 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
8 | File | `/etc/sudoers` | Medium
|
||||
9 | File | `/export` | Low
|
||||
10 | File | `/iissamples` | Medium
|
||||
11 | File | `/login` | Low
|
||||
12 | File | `/modules/profile/index.php` | High
|
||||
13 | File | `/monitoring` | Medium
|
||||
14 | File | `/new` | Low
|
||||
15 | File | `/proc/<pid>/status` | High
|
||||
16 | File | `/public/plugins/` | High
|
||||
17 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
18 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
19 | File | `/show_news.php` | High
|
||||
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
21 | File | `/tmp` | Low
|
||||
22 | File | `/uncpath/` | Medium
|
||||
23 | File | `/usr/bin/pkexec` | High
|
||||
24 | File | `/usr/sbin/suexec` | High
|
||||
25 | File | `/WEB-INF/web.xml` | High
|
||||
26 | File | `/wp-admin/admin-ajax.php` | High
|
||||
27 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
28 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
29 | File | `AccountManagerService.java` | High
|
||||
30 | File | `actions/CompanyDetailsSave.php` | High
|
||||
31 | File | `ActivityManagerService.java` | High
|
||||
32 | File | `adclick.php` | Medium
|
||||
33 | File | `admin.php` | Medium
|
||||
34 | File | `admin.php?page=languages` | High
|
||||
35 | File | `admin/add-glossary.php` | High
|
||||
36 | File | `admin/admin.php` | High
|
||||
37 | File | `admin/conf_users_edit.php` | High
|
||||
38 | File | `admin/edit-comments.php` | High
|
||||
39 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
|
||||
40 | File | `admin\db\DoSql.php` | High
|
||||
41 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
|
||||
7 | File | `/cgi-mod/lookup.cgi` | High
|
||||
8 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
9 | File | `/etc/sudoers` | Medium
|
||||
10 | File | `/export` | Low
|
||||
11 | File | `/iissamples` | Medium
|
||||
12 | File | `/login` | Low
|
||||
13 | File | `/modules/profile/index.php` | High
|
||||
14 | File | `/monitoring` | Medium
|
||||
15 | File | `/new` | Low
|
||||
16 | File | `/proc/<pid>/status` | High
|
||||
17 | File | `/public/plugins/` | High
|
||||
18 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
19 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
20 | File | `/show_news.php` | High
|
||||
21 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
22 | File | `/tmp` | Low
|
||||
23 | File | `/uncpath/` | Medium
|
||||
24 | File | `/usr/bin/pkexec` | High
|
||||
25 | File | `/usr/sbin/suexec` | High
|
||||
26 | File | `/WEB-INF/web.xml` | High
|
||||
27 | File | `/wp-admin/admin-ajax.php` | High
|
||||
28 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
29 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
30 | File | `AccountManagerService.java` | High
|
||||
31 | File | `actions/CompanyDetailsSave.php` | High
|
||||
32 | File | `ActivityManagerService.java` | High
|
||||
33 | File | `adclick.php` | Medium
|
||||
34 | File | `admin.php` | Medium
|
||||
35 | File | `admin.php?page=languages` | High
|
||||
36 | File | `admin/add-glossary.php` | High
|
||||
37 | File | `admin/admin.php` | High
|
||||
38 | File | `admin/conf_users_edit.php` | High
|
||||
39 | File | `admin/edit-comments.php` | High
|
||||
40 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
|
||||
41 | File | `admin\db\DoSql.php` | High
|
||||
42 | ... | ... | ...
|
||||
|
||||
There are 360 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 363 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -9,11 +9,11 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoolWebSearch:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* ...
|
||||
|
||||
There are 23 more country items available. Please use our online service to access the data.
|
||||
There are 22 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -159,7 +159,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -180,28 +180,28 @@ ID | Type | Indicator | Confidence
|
|||
11 | File | `/GponForm/fsetup_Form` | High
|
||||
12 | File | `/log_download.cgi` | High
|
||||
13 | File | `/modules/profile/index.php` | High
|
||||
14 | File | `/monitoring` | Medium
|
||||
15 | File | `/MTFWU` | Low
|
||||
16 | File | `/new` | Low
|
||||
17 | File | `/out.php` | Medium
|
||||
18 | File | `/proc/<pid>/status` | High
|
||||
19 | File | `/public/plugins/` | High
|
||||
20 | File | `/s/` | Low
|
||||
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
22 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
23 | File | `/server-info` | Medium
|
||||
24 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
25 | File | `/tmp` | Low
|
||||
26 | File | `/uncpath/` | Medium
|
||||
27 | File | `/updown/upload.cgi` | High
|
||||
28 | File | `/usr/bin/pkexec` | High
|
||||
29 | File | `/way4acs/enroll` | High
|
||||
30 | File | `/WEB-INF/web.xml` | High
|
||||
31 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
32 | File | `4.2.0.CP09` | Medium
|
||||
14 | File | `/MTFWU` | Low
|
||||
15 | File | `/new` | Low
|
||||
16 | File | `/proc/<pid>/status` | High
|
||||
17 | File | `/public/plugins/` | High
|
||||
18 | File | `/s/` | Low
|
||||
19 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
20 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
21 | File | `/server-info` | Medium
|
||||
22 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
23 | File | `/tmp` | Low
|
||||
24 | File | `/uncpath/` | Medium
|
||||
25 | File | `/updown/upload.cgi` | High
|
||||
26 | File | `/usr/bin/pkexec` | High
|
||||
27 | File | `/way4acs/enroll` | High
|
||||
28 | File | `/WEB-INF/web.xml` | High
|
||||
29 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
30 | File | `4.2.0.CP09` | Medium
|
||||
31 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
32 | File | `AccountManagerService.java` | High
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 277 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 281 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -14,12 +14,12 @@ The following _campaigns_ are known and can be associated with CopyKittens:
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CopyKittens:
|
||||
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -72,24 +72,27 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `/admin/configure.php` | High
|
||||
4 | File | `/admin/index.php?lfj=member&action=editmember` | High
|
||||
5 | File | `/admin/login.php` | High
|
||||
6 | File | `/apilog.php` | Medium
|
||||
7 | File | `/box_code_base.c` | High
|
||||
8 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
9 | File | `/forgetpassword.php` | High
|
||||
10 | File | `/formAdvFirewall` | High
|
||||
11 | File | `/function/booksave.php` | High
|
||||
12 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
13 | File | `/moddable/xs/sources/xsDataView.c` | High
|
||||
14 | File | `/ok_png.c` | Medium
|
||||
15 | File | `abc2ps.c` | Medium
|
||||
16 | File | `acknow.php` | Medium
|
||||
17 | File | `adminlogin.php` | High
|
||||
18 | File | `admin_home.php` | High
|
||||
19 | File | `alfresco/s/admin/admin-nodebrowser` | High
|
||||
20 | File | `allocator.cc` | Medium
|
||||
21 | ... | ... | ...
|
||||
6 | File | `/admin/modules/system/custom_field.php` | High
|
||||
7 | File | `/alerts/alertLightbox.php` | High
|
||||
8 | File | `/api /v3/auth` | High
|
||||
9 | File | `/apilog.php` | Medium
|
||||
10 | File | `/box_code_base.c` | High
|
||||
11 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
12 | File | `/forgetpassword.php` | High
|
||||
13 | File | `/formAdvFirewall` | High
|
||||
14 | File | `/function/booksave.php` | High
|
||||
15 | File | `/goform/SetInternetLanInfo` | High
|
||||
16 | File | `/goform/setPicListItem` | High
|
||||
17 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
18 | File | `/moddable/xs/sources/xsDataView.c` | High
|
||||
19 | File | `/ok_png.c` | Medium
|
||||
20 | File | `/one_church/userregister.php` | High
|
||||
21 | File | `acknow.php` | Medium
|
||||
22 | File | `adminlogin.php` | High
|
||||
23 | File | `admin_home.php` | High
|
||||
24 | ... | ... | ...
|
||||
|
||||
There are 178 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 200 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,39 +1,39 @@
|
|||
# Corkow - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Corkow](https://vuldb.com/?actor.corkow). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Corkow](https://vuldb.com/?actor.corkow). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.corkow](https://vuldb.com/?actor.corkow)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.corkow](https://vuldb.com/?actor.corkow)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Corkow.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Corkow.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 1.17.6.4 | - | High
|
||||
2 | 3.8.9.6 | ec2-3-8-9-6.eu-west-2.compute.amazonaws.com | Medium
|
||||
3 | 4.1.0.1 | - | High
|
||||
4 | 4.3.1.2 | - | High
|
||||
5 | 4.3.9.1 | - | High
|
||||
6 | 4.3.9.5 | - | High
|
||||
7 | 4.3.9.7 | - | High
|
||||
8 | 4.3.9.8 | - | High
|
||||
9 | 4.4.7.1 | lag-32-1065-99.ear3.Chicago2.Level3.net | High
|
||||
10 | 4.4.7.2 | ANDERSEN-CO.ear3.Chicago2.Level3.net | High
|
||||
11 | 4.4.7.7 | - | High
|
||||
12 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [1.17.6.4](https://vuldb.com/?ip.1.17.6.4) | - | - | High
|
||||
2 | [3.8.9.6](https://vuldb.com/?ip.3.8.9.6) | ec2-3-8-9-6.eu-west-2.compute.amazonaws.com | - | Medium
|
||||
3 | [4.1.0.1](https://vuldb.com/?ip.4.1.0.1) | - | - | High
|
||||
4 | [4.3.1.2](https://vuldb.com/?ip.4.3.1.2) | - | - | High
|
||||
5 | [4.3.9.1](https://vuldb.com/?ip.4.3.9.1) | - | - | High
|
||||
6 | [4.3.9.5](https://vuldb.com/?ip.4.3.9.5) | - | - | High
|
||||
7 | [4.3.9.7](https://vuldb.com/?ip.4.3.9.7) | - | - | High
|
||||
8 | [4.3.9.8](https://vuldb.com/?ip.4.3.9.8) | - | - | High
|
||||
9 | [4.4.7.1](https://vuldb.com/?ip.4.4.7.1) | lag-32-1065-99.ear3.Chicago2.Level3.net | - | High
|
||||
10 | [4.4.7.2](https://vuldb.com/?ip.4.4.7.2) | ANDERSEN-CO.ear3.Chicago2.Level3.net | - | High
|
||||
11 | [4.4.7.7](https://vuldb.com/?ip.4.4.7.7) | - | - | High
|
||||
12 | ... | ... | ... | ...
|
||||
|
||||
There are 45 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/#apt_report_19
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# CosmicDuke - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CosmicDuke](https://vuldb.com/?actor.cosmicduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CosmicDuke](https://vuldb.com/?actor.cosmicduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cosmicduke](https://vuldb.com/?actor.cosmicduke)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CosmicDuke:
|
||||
|
||||
* LU
|
||||
* DE
|
||||
* SE
|
||||
* [LU](https://vuldb.com/?country.lu)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [SE](https://vuldb.com/?country.se)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 46.246.120.178 | - | - | High
|
||||
2 | 91.224.141.235 | - | - | High
|
||||
3 | 94.242.199.88 | ip-static-94-242-199-88.server.lu | - | High
|
||||
1 | [46.246.120.178](https://vuldb.com/?ip.46.246.120.178) | - | - | High
|
||||
2 | [91.224.141.235](https://vuldb.com/?ip.91.224.141.235) | - | - | High
|
||||
3 | [94.242.199.88](https://vuldb.com/?ip.94.242.199.88) | ip-static-94-242-199-88.server.lu | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CosmicDuke. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CosmicDuke_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,45 +1,45 @@
|
|||
# CozyDuke - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CozyDuke](https://vuldb.com/?actor.cozyduke). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CozyDuke](https://vuldb.com/?actor.cozyduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cozyduke](https://vuldb.com/?actor.cozyduke)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cozyduke](https://vuldb.com/?actor.cozyduke)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with CozyDuke:
|
||||
The following _campaigns_ are known and can be associated with CozyDuke:
|
||||
|
||||
* MiniDionis
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CozyDuke:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CozyDuke:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CozyDuke.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CozyDuke.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 64.244.34.200 | - | High
|
||||
2 | 121.193.130.170 | - | High
|
||||
3 | 122.228.193.115 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [64.244.34.200](https://vuldb.com/?ip.64.244.34.200) | - | MiniDionis | High
|
||||
2 | [121.193.130.170](https://vuldb.com/?ip.121.193.130.170) | - | - | High
|
||||
3 | [122.228.193.115](https://vuldb.com/?ip.122.228.193.115) | - | MiniDionis | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CozyDuke_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -48,14 +48,14 @@ ID | Type | Indicator | Confidence
|
|||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=MiniDionis_CozyCar_Seaduke.pdf&y=2015
|
||||
* https://www.threatminer.org/report.php?q=TheCozyDukeAPT-Securelist.pdf&y=2015
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,30 @@
|
|||
# Crafty Panda - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crafty Panda](https://vuldb.com/?actor.crafty_panda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crafty_panda](https://vuldb.com/?actor.crafty_panda)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crafty Panda.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [69.172.75.223](https://vuldb.com/?ip.69.172.75.223) | 69-172-75-223.static.imsbiz.com | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.nttsecurity.com/docs/librariesprovider3/default-document-library/craftypanda-analysis-report
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,36 +1,36 @@
|
|||
# Crashoverride - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crashoverride](https://vuldb.com/?actor.crashoverride). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crashoverride](https://vuldb.com/?actor.crashoverride). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crashoverride](https://vuldb.com/?actor.crashoverride)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crashoverride](https://vuldb.com/?actor.crashoverride)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crashoverride:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crashoverride:
|
||||
|
||||
* RU
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crashoverride.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crashoverride.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.39.218.152 | - | High
|
||||
2 | 93.115.27.57 | - | High
|
||||
3 | 195.16.88.6 | server10005.defaulthost.net | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.39.218.152](https://vuldb.com/?ip.5.39.218.152) | - | - | High
|
||||
2 | [93.115.27.57](https://vuldb.com/?ip.93.115.27.57) | - | - | High
|
||||
3 | [195.16.88.6](https://vuldb.com/?ip.195.16.88.6) | server10005.defaulthost.net | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Crashoverride_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-80 | Cross Site Scripting | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -39,17 +39,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `web/upload/UploadHandler.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 2 more IOA items available. Please use our online service to access the data.
|
||||
There are 2 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=CrashOverride-01-DragosSecurity.pdf&y=2017
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,51 +1,51 @@
|
|||
# Crimeware - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crimeware](https://vuldb.com/?actor.crimeware). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crimeware](https://vuldb.com/?actor.crimeware). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crimeware](https://vuldb.com/?actor.crimeware)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crimeware](https://vuldb.com/?actor.crimeware)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Crimeware:
|
||||
The following _campaigns_ are known and can be associated with Crimeware:
|
||||
|
||||
* CTB-Locker
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crimeware:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crimeware:
|
||||
|
||||
* FR
|
||||
* US
|
||||
* IT
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crimeware.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crimeware.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.134.122.150 | hpt01.web.l1.armada.it | High
|
||||
2 | 64.71.33.177 | - | High
|
||||
3 | 188.93.8.7 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.134.122.150](https://vuldb.com/?ip.5.134.122.150) | hpt01.web.l1.armada.it | CTB-Locker | High
|
||||
2 | [64.71.33.177](https://vuldb.com/?ip.64.71.33.177) | - | CTB-Locker | High
|
||||
3 | [188.93.8.7](https://vuldb.com/?ip.188.93.8.7) | - | CTB-Locker | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Crimeware. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Crimeware_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1068 | Execution with Unnecessary Privileges | High
|
||||
2 | T1587.003 | Improper Certificate Validation | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
2 | T1587.003 | CWE-295 | Improper Certificate Validation | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crimeware. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crimeware. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -54,17 +54,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `fs/inode.c` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 4 more IOA items available. Please use our online service to access the data.
|
||||
There are 4 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/newest-ctb-locker-campaign-bypasses-legacy-security-products/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,31 +1,37 @@
|
|||
# Cryptbot - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cryptbot](https://vuldb.com/?actor.cryptbot). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cryptbot](https://vuldb.com/?actor.cryptbot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cryptbot](https://vuldb.com/?actor.cryptbot)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cryptbot](https://vuldb.com/?actor.cryptbot)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cryptbot:
|
||||
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cryptbot.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cryptbot.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 8.248.153.254 | - | High
|
||||
2 | 8.248.163.254 | - | High
|
||||
3 | 8.248.167.254 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [8.248.153.254](https://vuldb.com/?ip.8.248.153.254) | - | - | High
|
||||
2 | [8.248.163.254](https://vuldb.com/?ip.8.248.163.254) | - | - | High
|
||||
3 | [8.248.167.254](https://vuldb.com/?ip.8.248.167.254) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 13 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/10/threat-roundup-1008-1015.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,55 +1,55 @@
|
|||
# CryptoPHP - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CryptoPHP](https://vuldb.com/?actor.cryptophp). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CryptoPHP](https://vuldb.com/?actor.cryptophp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cryptophp](https://vuldb.com/?actor.cryptophp)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cryptophp](https://vuldb.com/?actor.cryptophp)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CryptoPHP:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CryptoPHP:
|
||||
|
||||
* US
|
||||
* PL
|
||||
* RU
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CryptoPHP.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CryptoPHP.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 50.17.195.149 | ec2-50-17-195-149.compute-1.amazonaws.com | Medium
|
||||
2 | 78.138.118.195 | - | High
|
||||
3 | 78.138.118.196 | - | High
|
||||
4 | 78.138.118.197 | - | High
|
||||
5 | 78.138.118.198 | - | High
|
||||
6 | 78.138.118.199 | - | High
|
||||
7 | 78.138.118.200 | - | High
|
||||
8 | 78.138.118.201 | - | High
|
||||
9 | 78.138.118.202 | - | High
|
||||
10 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [50.17.195.149](https://vuldb.com/?ip.50.17.195.149) | ec2-50-17-195-149.compute-1.amazonaws.com | - | Medium
|
||||
2 | [78.138.118.195](https://vuldb.com/?ip.78.138.118.195) | - | - | High
|
||||
3 | [78.138.118.196](https://vuldb.com/?ip.78.138.118.196) | - | - | High
|
||||
4 | [78.138.118.197](https://vuldb.com/?ip.78.138.118.197) | - | - | High
|
||||
5 | [78.138.118.198](https://vuldb.com/?ip.78.138.118.198) | - | - | High
|
||||
6 | [78.138.118.199](https://vuldb.com/?ip.78.138.118.199) | - | - | High
|
||||
7 | [78.138.118.200](https://vuldb.com/?ip.78.138.118.200) | - | - | High
|
||||
8 | [78.138.118.201](https://vuldb.com/?ip.78.138.118.201) | - | - | High
|
||||
9 | [78.138.118.202](https://vuldb.com/?ip.78.138.118.202) | - | - | High
|
||||
10 | ... | ... | ... | ...
|
||||
|
||||
There are 35 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CryptoPHP_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -58,17 +58,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `FormDisplay.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 12 more IOA items available. Please use our online service to access the data.
|
||||
There are 12 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/fox-it/cryptophp/blob/master/ips.txt
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,70 @@
|
|||
# Curious Gorge - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Curious Gorge](https://vuldb.com/?actor.curious_gorge). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.curious_gorge](https://vuldb.com/?actor.curious_gorge)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Curious Gorge:
|
||||
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Curious Gorge.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.188.108.119](https://vuldb.com/?ip.5.188.108.119) | t200514-1.com | - | High
|
||||
2 | [45.154.12.167](https://vuldb.com/?ip.45.154.12.167) | - | - | High
|
||||
3 | [91.216.190.58](https://vuldb.com/?ip.91.216.190.58) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Curious Gorge_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Curious Gorge. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/cgi-bin/supervisor/PwdGrp.cgi` | High
|
||||
2 | File | `/Items/*/RemoteImages/Download` | High
|
||||
3 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
|
||||
4 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
5 | File | `adclick.php` | Medium
|
||||
6 | ... | ... | ...
|
||||
|
||||
There are 36 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue