This commit is contained in:
Marc Ruef 2022-04-01 12:05:45 +02:00
parent d8bfb92c48
commit d181d02f63
582 changed files with 27234 additions and 23384 deletions

View File

@ -30,7 +30,7 @@ There are 4 more IOC items available. Please use our online service to access th
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT-C-01_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT-C-01_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [DE](https://vuldb.com/?country.de)
* ...
There are 20 more country items available. Please use our online service to access the data.
There are 21 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -30,7 +30,7 @@ There are 5 more IOC items available. Please use our online service to access th
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT-C-36_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT-C-36_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -49,8 +49,8 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `$SPLUNK_HOME/etc/splunk-launch.conf` | High
2 | File | `/+CSCOE+/logon.html` | High
3 | File | `/admin/model/database.class.php` | High
4 | File | `/assets/ctx` | Medium
3 | File | `/assets/ctx` | Medium
4 | File | `/cloud_config/router_post/check_reg_verify_code` | High
5 | File | `/concat?/%2557EB-INF/web.xml` | High
6 | File | `/config/getuser` | High
7 | File | `/debug/pprof` | Medium
@ -58,13 +58,13 @@ ID | Type | Indicator | Confidence
9 | File | `/filemanager/php/connector.php` | High
10 | File | `/get_getnetworkconf.cgi` | High
11 | File | `/HNAP1` | Low
12 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
14 | File | `/modx/manager/index.php` | High
15 | File | `/osm/REGISTER.cmd` | High
16 | File | `/product_list.php` | High
17 | File | `/replication` | Medium
18 | File | `/see_more_details.php` | High
12 | File | `/include/chart_generator.php` | High
13 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
14 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
15 | File | `/modx/manager/index.php` | High
16 | File | `/osm/REGISTER.cmd` | High
17 | File | `/product_list.php` | High
18 | File | `/replication` | Medium
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
20 | File | `/supervisor/procesa_carga.php` | High
21 | File | `/type.php` | Medium
@ -82,34 +82,32 @@ ID | Type | Indicator | Confidence
33 | File | `admin.joomlaradiov5.php` | High
34 | File | `admin.php` | Medium
35 | File | `admin.php?m=Food&a=addsave` | High
36 | File | `admin/category.inc.php` | High
37 | File | `admin/conf_users_edit.php` | High
38 | File | `admin/index.php` | High
39 | File | `admin/user.php` | High
40 | File | `admin/write-post.php` | High
41 | File | `administrator/components/com_media/helpers/media.php` | High
42 | File | `admin_events.php` | High
43 | File | `ajax_new_account.php` | High
44 | File | `akocomments.php` | High
45 | File | `allopass-error.php` | High
46 | File | `announcement.php` | High
47 | File | `api_poller.php` | High
48 | File | `apply.cgi` | Medium
49 | File | `archiver\index.php` | High
50 | File | `artlinks.dispnew.php` | High
51 | File | `auth.inc.php` | Medium
52 | File | `authorization.do` | High
53 | File | `awstats.pl` | Medium
54 | File | `backoffice/login.asp` | High
55 | File | `bb_usage_stats.php` | High
56 | File | `binder.c` | Medium
57 | File | `bl-kernel/ajax/upload-images.php` | High
58 | File | `books.php` | Medium
59 | File | `C:\Python27` | Medium
60 | File | `C:\Windows\System32\config\SAM` | High
61 | ... | ... | ...
36 | File | `admin/conf_users_edit.php` | High
37 | File | `admin/index.php` | High
38 | File | `admin/user.php` | High
39 | File | `admin/write-post.php` | High
40 | File | `administrator/components/com_media/helpers/media.php` | High
41 | File | `admin_events.php` | High
42 | File | `ajax_new_account.php` | High
43 | File | `akocomments.php` | High
44 | File | `allopass-error.php` | High
45 | File | `announcement.php` | High
46 | File | `apply.cgi` | Medium
47 | File | `archiver\index.php` | High
48 | File | `artlinks.dispnew.php` | High
49 | File | `auth.inc.php` | Medium
50 | File | `authorization.do` | High
51 | File | `awstats.pl` | Medium
52 | File | `backoffice/login.asp` | High
53 | File | `bb_usage_stats.php` | High
54 | File | `binder.c` | Medium
55 | File | `bl-kernel/ajax/upload-images.php` | High
56 | File | `books.php` | Medium
57 | File | `C:\Python27` | Medium
58 | File | `C:\Windows\System32\config\SAM` | High
59 | ... | ... | ...
There are 530 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 517 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -18,7 +18,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [DE](https://vuldb.com/?country.de)
* [CH](https://vuldb.com/?country.ch)
* ...
There are 9 more country items available. Please use our online service to access the data.
@ -105,11 +105,11 @@ ID | Type | Indicator | Confidence
27 | File | `ajax_udf.php` | Medium
28 | File | `AppCompatCache.exe` | High
29 | File | `application.js.php` | High
30 | File | `apply.cgi` | Medium
31 | File | `arm/lithium-codegen-arm.cc` | High
30 | File | `arm/lithium-codegen-arm.cc` | High
31 | File | `authenticate.c` | High
32 | ... | ... | ...
There are 271 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 273 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# APT12 - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT12](https://vuldb.com/?actor.apt12). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT12](https://vuldb.com/?actor.apt12). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt12](https://vuldb.com/?actor.apt12)
@ -14,9 +14,9 @@ The following _campaigns_ are known and can be associated with APT12:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT12:
* ES
* AR
* US
* [ES](https://vuldb.com/?country.es)
* [AR](https://vuldb.com/?country.ar)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -24,21 +24,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 32.114.251.129 | - | Etumbot | High
2 | 59.0.249.11 | - | Etumbot | High
3 | 92.54.232.142 | - | Etumbot | High
1 | [32.114.251.129](https://vuldb.com/?ip.32.114.251.129) | - | Etumbot | High
2 | [59.0.249.11](https://vuldb.com/?ip.59.0.249.11) | - | Etumbot | High
3 | [92.54.232.142](https://vuldb.com/?ip.92.54.232.142) | - | Etumbot | High
4 | ... | ... | ... | ...
There are 14 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT12. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT12_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1499 | CWE-404 | Resource Consumption | High
## IOA - Indicator of Attack

View File

@ -21,7 +21,7 @@ ID | IP address | Hostname | Campaign | Confidence
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT16. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT16_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -37,7 +37,7 @@ There are 17 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT17_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT17_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,44 +1,44 @@
# APT19 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT19](https://vuldb.com/?actor.apt19). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT19](https://vuldb.com/?actor.apt19). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt19](https://vuldb.com/?actor.apt19)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt19](https://vuldb.com/?actor.apt19)
## Campaigns
The following campaigns are known and can be associated with APT19:
The following _campaigns_ are known and can be associated with APT19:
* c0d0s0
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT19:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT19:
* CN
* [CN](https://vuldb.com/?country.cn)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT19.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT19.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 42.200.18.194 | - | High
2 | 104.236.77.169 | - | High
3 | 121.54.168.230 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [42.200.18.194](https://vuldb.com/?ip.42.200.18.194) | - | c0d0s0 | High
2 | [104.236.77.169](https://vuldb.com/?ip.104.236.77.169) | - | - | High
3 | [121.54.168.230](https://vuldb.com/?ip.121.54.168.230) | - | - | High
4 | ... | ... | ... | ...
There are 4 more IOC items available. Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/new-attacks-linked-to-c0d0s0-group/
* https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -38,7 +38,7 @@ There are 34 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT2. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT2_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -47,7 +47,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
There are 1 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack

View File

@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [ES](https://vuldb.com/?country.es)
* ...
There are 5 more country items available. Please use our online service to access the data.
There are 11 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -31,13 +31,18 @@ ID | IP address | Hostname | Campaign | Confidence
2 | [34.93.247.126](https://vuldb.com/?ip.34.93.247.126) | 126.247.93.34.bc.googleusercontent.com | SysUpdate | Medium
3 | [35.187.148.253](https://vuldb.com/?ip.35.187.148.253) | 253.148.187.35.bc.googleusercontent.com | SysUpdate | Medium
4 | [35.220.135.85](https://vuldb.com/?ip.35.220.135.85) | 85.135.220.35.bc.googleusercontent.com | SysUpdate | Medium
5 | ... | ... | ... | ...
5 | [45.77.250.141](https://vuldb.com/?ip.45.77.250.141) | 45.77.250.141.vultr.com | - | Medium
6 | [45.142.214.188](https://vuldb.com/?ip.45.142.214.188) | vm309132.pq.hosting | SysUpdate | High
7 | [47.75.49.32](https://vuldb.com/?ip.47.75.49.32) | - | SysUpdate | High
8 | [49.143.192.221](https://vuldb.com/?ip.49.143.192.221) | - | - | High
9 | [49.143.205.30](https://vuldb.com/?ip.49.143.205.30) | - | - | High
10 | ... | ... | ... | ...
There are 16 more IOC items available. Please use our online service to access the data.
There are 35 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT27. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT27_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -46,7 +51,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 9 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -56,28 +61,43 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/+CSCOE+/logon.html` | High
2 | File | `/cgi-bin/live_api.cgi` | High
3 | File | `/config/getuser` | High
4 | File | `/etc/shadow` | Medium
5 | File | `/infusions/shoutbox_panel/shoutbox_admin.php` | High
6 | File | `/oscommerce/admin/currencies.php` | High
7 | File | `/proc/pid/syscall` | High
8 | File | `/rapi/read_url` | High
9 | File | `/session/list/allActiveSession` | High
10 | File | `/syslog_rules` | High
11 | File | `/uncpath/` | Medium
12 | File | `/upload` | Low
13 | File | `/users/{id}` | Medium
14 | File | `/video` | Low
15 | File | `ActivityManagerService.java` | High
16 | File | `adaptmap_reg.c` | High
17 | File | `admin.cgi` | Medium
18 | File | `admin.php` | Medium
19 | File | `admin.php?action=files` | High
20 | File | `admin/modules/master_file/rda_cmc.php?keywords` | High
21 | File | `album_portal.php` | High
22 | ... | ... | ...
3 | File | `/cgi-bin/wapopen` | High
4 | File | `/config/getuser` | High
5 | File | `/etc/ajenti/config.yml` | High
6 | File | `/etc/shadow` | Medium
7 | File | `/goform/telnet` | High
8 | File | `/infusions/shoutbox_panel/shoutbox_admin.php` | High
9 | File | `/modules/profile/index.php` | High
10 | File | `/oscommerce/admin/currencies.php` | High
11 | File | `/proc/pid/syscall` | High
12 | File | `/rapi/read_url` | High
13 | File | `/rom-0` | Low
14 | File | `/session/list/allActiveSession` | High
15 | File | `/syslog_rules` | High
16 | File | `/tmp/phpglibccheck` | High
17 | File | `/uncpath/` | Medium
18 | File | `/upload` | Low
19 | File | `/users/{id}` | Medium
20 | File | `/var/tmp/sess_*` | High
21 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
22 | File | `/video` | Low
23 | File | `actionphp/download.File.php` | High
24 | File | `ActivityManagerService.java` | High
25 | File | `adaptmap_reg.c` | High
26 | File | `add_comment.php` | High
27 | File | `admin.cgi` | Medium
28 | File | `admin.php` | Medium
29 | File | `admin.php?action=files` | High
30 | File | `admin/admin.php` | High
31 | File | `admin/content.php` | High
32 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
33 | File | `admin/modules/master_file/rda_cmc.php?keywords` | High
34 | File | `affich.php` | Medium
35 | File | `agent/Core/Controller/SendRequest.cpp` | High
36 | File | `album_portal.php` | High
37 | ... | ... | ...
There are 187 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 321 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -86,6 +106,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://github.com/hvs-consulting/ioc_signatures/blob/main/Emissary_Panda_APT27/HvS_APT27_2021-10_IOCs.csv
* https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/
* https://vxug.fakedoma.in/archive/APTs/2021/2021.04.09/Iron%20Tiger.pdf
* https://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage
* https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/
## Literature

View File

@ -104,39 +104,38 @@ ID | Type | Indicator | Confidence
1 | File | `.travis.yml` | Medium
2 | File | `/.env` | Low
3 | File | `/admin.php` | Medium
4 | File | `/admin/config.php?display=disa&view=form` | High
5 | File | `/category_view.php` | High
6 | File | `/dev/kmem` | Medium
7 | File | `/file?action=download&file` | High
8 | File | `/filemanager/upload.php` | High
9 | File | `/medical/inventories.php` | High
10 | File | `/monitoring` | Medium
11 | File | `/NAGErrors` | Medium
12 | File | `/plugins/servlet/audit/resource` | High
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
14 | File | `/REBOOTSYSTEM` | High
15 | File | `/replication` | Medium
16 | File | `/reports/rwservlet` | High
17 | File | `/RestAPI` | Medium
18 | File | `/tmp` | Low
19 | File | `/tmp/speedtest_urls.xml` | High
20 | File | `/uncpath/` | Medium
21 | File | `/var/log/nginx` | High
22 | File | `/wp-admin/admin.php` | High
23 | File | `/wp-json/wc/v3/webhooks` | High
24 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
25 | File | `admin/app/mediamanager` | High
26 | File | `admin/index.php` | High
27 | File | `admin\model\catalog\download.php` | High
28 | File | `afr.php` | Low
29 | File | `apcupsd.pid` | Medium
30 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
31 | File | `api/sms/send-sms` | High
32 | File | `api/v1/alarms` | High
33 | File | `application/controller/InstallerController.php` | High
34 | ... | ... | ...
4 | File | `/category_view.php` | High
5 | File | `/dev/kmem` | Medium
6 | File | `/file?action=download&file` | High
7 | File | `/filemanager/upload.php` | High
8 | File | `/medical/inventories.php` | High
9 | File | `/monitoring` | Medium
10 | File | `/NAGErrors` | Medium
11 | File | `/plugins/servlet/audit/resource` | High
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
13 | File | `/REBOOTSYSTEM` | High
14 | File | `/replication` | Medium
15 | File | `/reports/rwservlet` | High
16 | File | `/RestAPI` | Medium
17 | File | `/tmp` | Low
18 | File | `/tmp/speedtest_urls.xml` | High
19 | File | `/uncpath/` | Medium
20 | File | `/var/log/nginx` | High
21 | File | `/wp-admin/admin.php` | High
22 | File | `/wp-json/wc/v3/webhooks` | High
23 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
24 | File | `admin/app/mediamanager` | High
25 | File | `admin/index.php` | High
26 | File | `admin\model\catalog\download.php` | High
27 | File | `afr.php` | Low
28 | File | `apcupsd.pid` | Medium
29 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
30 | File | `api/sms/send-sms` | High
31 | File | `api/v1/alarms` | High
32 | File | `application/controller/InstallerController.php` | High
33 | ... | ... | ...
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 284 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -90,32 +90,32 @@ ID | Type | Indicator | Confidence
12 | File | `/context/%2e/WEB-INF/web.xml` | High
13 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
14 | File | `/dcim/sites/add/` | High
15 | File | `/EXCU_SHELL` | Medium
16 | File | `/fudforum/adm/hlplist.php` | High
17 | File | `/login` | Low
18 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
19 | File | `/monitoring` | Medium
20 | File | `/ms/cms/content/list.do` | High
21 | File | `/new` | Low
22 | File | `/orms/` | Low
23 | File | `/proc/<pid>/status` | High
24 | File | `/public/plugins/` | High
25 | File | `/rom` | Low
26 | File | `/scripts/killpvhost` | High
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
28 | File | `/secure/QueryComponent!Default.jspa` | High
29 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
30 | File | `/tmp` | Low
31 | File | `/tmp/redis.ds` | High
32 | File | `/uncpath/` | Medium
33 | File | `/wp-admin` | Medium
34 | File | `/wp-json/wc/v3/webhooks` | High
35 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
36 | File | `ABuffer.cpp` | Medium
37 | File | `AccountManagerService.java` | High
15 | File | `/fudforum/adm/hlplist.php` | High
16 | File | `/login` | Low
17 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
18 | File | `/monitoring` | Medium
19 | File | `/ms/cms/content/list.do` | High
20 | File | `/new` | Low
21 | File | `/orms/` | Low
22 | File | `/proc/<pid>/status` | High
23 | File | `/public/plugins/` | High
24 | File | `/rom` | Low
25 | File | `/scripts/killpvhost` | High
26 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
27 | File | `/secure/QueryComponent!Default.jspa` | High
28 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
29 | File | `/tmp` | Low
30 | File | `/tmp/redis.ds` | High
31 | File | `/uncpath/` | Medium
32 | File | `/wp-admin` | Medium
33 | File | `/wp-json/wc/v3/webhooks` | High
34 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
35 | File | `ABuffer.cpp` | Medium
36 | File | `AccountManagerService.java` | High
37 | File | `actions/CompanyDetailsSave.php` | High
38 | ... | ... | ...
There are 328 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 330 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -76,34 +76,34 @@ ID | Type | Indicator | Confidence
20 | File | `/password.html` | High
21 | File | `/proc/ioports` | High
22 | File | `/property-list/property_view.php` | High
23 | File | `/rest` | Low
24 | File | `/rest/api/2/search` | High
25 | File | `/s/` | Low
26 | File | `/scripts/cpan_config` | High
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
28 | File | `/services/system/setup.json` | High
29 | File | `/uncpath/` | Medium
30 | File | `/webconsole/APIController` | High
31 | File | `/websocket/exec` | High
32 | File | `/wp-admin/admin-ajax.php` | High
33 | File | `/wp-json/oembed/1.0/embed?url` | High
34 | File | `/_next` | Low
35 | File | `4.edu.php\conn\function.php` | High
36 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
37 | File | `adclick.php` | Medium
38 | File | `addentry.php` | Medium
39 | File | `addressbook.php` | High
40 | File | `add_comment.php` | High
41 | File | `admin/category.inc.php` | High
42 | File | `admin/conf_users_edit.php` | High
43 | File | `admin/dl_sendmail.php` | High
44 | File | `admin/index.php` | High
45 | File | `admin/languages.php` | High
46 | File | `admin/password_forgotten.php` | High
47 | File | `admin/versions.html` | High
23 | File | `/ptms/classes/Users.php` | High
24 | File | `/rest` | Low
25 | File | `/rest/api/2/search` | High
26 | File | `/s/` | Low
27 | File | `/scripts/cpan_config` | High
28 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
29 | File | `/services/system/setup.json` | High
30 | File | `/uncpath/` | Medium
31 | File | `/webconsole/APIController` | High
32 | File | `/websocket/exec` | High
33 | File | `/wp-admin/admin-ajax.php` | High
34 | File | `/wp-json/oembed/1.0/embed?url` | High
35 | File | `/_next` | Low
36 | File | `4.edu.php\conn\function.php` | High
37 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
38 | File | `adclick.php` | Medium
39 | File | `addentry.php` | Medium
40 | File | `addressbook.php` | High
41 | File | `add_comment.php` | High
42 | File | `admin/category.inc.php` | High
43 | File | `admin/conf_users_edit.php` | High
44 | File | `admin/dl_sendmail.php` | High
45 | File | `admin/index.php` | High
46 | File | `admin/languages.php` | High
47 | File | `admin/password_forgotten.php` | High
48 | ... | ... | ...
There are 412 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 414 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,28 +1,28 @@
# APT30 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT30](https://vuldb.com/?actor.apt30). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT30](https://vuldb.com/?actor.apt30). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt30](https://vuldb.com/?actor.apt30)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt30](https://vuldb.com/?actor.apt30)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT30.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT30.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.1.0.29 | 5-1-0-29.datagroup.ua | High
2 | 112.117.9.222 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.1.0.29](https://vuldb.com/?ip.5.1.0.29) | 5-1-0-29.datagroup.ua | - | High
2 | [112.117.9.222](https://vuldb.com/?ip.112.117.9.222) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=rpt-apt30.pdf&y=2015
* https://www.threatminer.org/_reports/2015/rpt-apt30.pdf#viewer.action=download
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -87,7 +87,7 @@ ID | Type | Indicator | Confidence
22 | File | `asm/float.c` | Medium
23 | ... | ... | ...
There are 188 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 189 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -21,7 +21,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [ES](https://vuldb.com/?country.es)
* ...
There are 6 more country items available. Please use our online service to access the data.
There are 7 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -54,12 +54,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
There are 8 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -69,31 +69,33 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.htaccess` | Medium
2 | File | `/admin.add` | Medium
3 | File | `/admin/?page=user/manage_user` | High
4 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
5 | File | `/admin/customers.php?page=1&cID` | High
6 | File | `/admin/edit_user.php` | High
7 | File | `/admin/files` | Medium
8 | File | `/admin/login.php` | High
9 | File | `/administrator/components/menu/` | High
10 | File | `/administrator/components/table_manager/` | High
11 | File | `/api/appInternals/1.0/agent/configuration&amp` | High
12 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
13 | File | `/api/fetch` | Medium
14 | File | `/api/ZRMesh/set_ZRMesh` | High
15 | File | `/audit/log/log_management.php` | High
16 | File | `/cloud_config/router_post/register` | High
17 | File | `/cwms/admin/?page=articles/view_article/` | High
18 | File | `/Hospital-Management-System-master/contact.php` | High
19 | File | `/Hospital-Management-System-master/func.php` | High
20 | File | `/i/:data/ipa.plist` | High
21 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
22 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
3 | File | `/admin.php/admin/art/data.html` | High
4 | File | `/admin/?page=user/manage_user` | High
5 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
6 | File | `/admin/customers.php?page=1&cID` | High
7 | File | `/admin/edit_user.php` | High
8 | File | `/admin/files` | Medium
9 | File | `/admin/login.php` | High
10 | File | `/administrator/components/menu/` | High
11 | File | `/administrator/components/table_manager/` | High
12 | File | `/api/appInternals/1.0/agent/configuration&amp` | High
13 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
14 | File | `/api/fetch` | Medium
15 | File | `/api/user/{ID}` | High
16 | File | `/audit/log/log_management.php` | High
17 | File | `/cloud_config/router_post/register` | High
18 | File | `/config/list` | Medium
19 | File | `/cwms/admin/?page=articles/view_article/` | High
20 | File | `/Hospital-Management-System-master/contact.php` | High
21 | File | `/Hospital-Management-System-master/func.php` | High
22 | File | `/i/:data/ipa.plist` | High
23 | File | `/jerry-core/jmem/jmem-heap.c` | High
24 | File | `/ManageRoute/postRoute` | High
25 | ... | ... | ...
25 | File | `/ms/cms/content/list.do` | High
26 | File | `/orms/` | Low
27 | ... | ... | ...
There are 214 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 232 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with APT36:
* C-Major
* Crimson RAT
## Countries
@ -34,14 +35,14 @@ ID | IP address | Hostname | Campaign | Confidence
5 | [5.189.167.65](https://vuldb.com/?ip.5.189.167.65) | vmi437585.contaboserver.net | C-Major | High
6 | [23.254.119.11](https://vuldb.com/?ip.23.254.119.11) | - | - | High
7 | [64.188.12.126](https://vuldb.com/?ip.64.188.12.126) | 64.188.12.126.static.quadranet.com | - | High
8 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
9 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
10 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
11 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
12 | [82.196.13.94](https://vuldb.com/?ip.82.196.13.94) | - | C-Major | High
8 | [64.188.25.205](https://vuldb.com/?ip.64.188.25.205) | 64.188.25.205.static.quadranet.com | Crimson RAT | High
9 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
10 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
11 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
12 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
13 | ... | ... | ... | ...
There are 46 more IOC items available. Please use our online service to access the data.
There are 47 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -96,6 +97,7 @@ There are 229 more IOA items available (file, library, argument, input value, pa
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/
* https://vxug.fakedoma.in/archive/APTs/2021/2021.05.13/Transparent%20Tribe.pdf
* https://www.threatminer.org/report.php?q=indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf&y=2016
* https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html

View File

@ -1,53 +1,53 @@
# APT37 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT37](https://vuldb.com/?actor.apt37). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT37](https://vuldb.com/?actor.apt37). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt37](https://vuldb.com/?actor.apt37)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt37](https://vuldb.com/?actor.apt37)
## Campaigns
The following campaigns are known and can be associated with APT37:
The following _campaigns_ are known and can be associated with APT37:
* Daybreak
* Scarcruft
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT37:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT37:
* US
* PL
* RU
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT37.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT37.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 34.13.42.35 | - | High
2 | 120.192.73.202 | - | High
3 | 180.182.52.76 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [34.13.42.35](https://vuldb.com/?ip.34.13.42.35) | - | Scarcruft | High
2 | [120.192.73.202](https://vuldb.com/?ip.120.192.73.202) | - | Scarcruft | High
3 | [180.182.52.76](https://vuldb.com/?ip.180.182.52.76) | - | Scarcruft | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by APT37. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT37_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1600 | Cryptographic Issues | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
3 | T1600 | CWE-310 | Cryptographic Issues | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT37. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT37. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -56,18 +56,18 @@ ID | Type | Indicator | Confidence
3 | File | `includes/startup.php` | High
4 | ... | ... | ...
There are 5 more IOA items available. Please use our online service to access the data.
There are 5 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://securelist.com/operation-daybreak/75100/
* https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -30,7 +30,7 @@ There are 2 more IOC items available. Please use our online service to access th
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _APT38_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT38_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -60,9 +60,10 @@ ID | Type | Indicator | Confidence
5 | File | `/magnoliaPublic/travel/members/login.html` | High
6 | File | `/Main_AdmStatus_Content.asp` | High
7 | File | `/server-status` | High
8 | ... | ... | ...
8 | File | `/uncpath/` | Medium
9 | ... | ... | ...
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 62 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -109,7 +109,7 @@ ID | Type | Indicator | Confidence
33 | File | `admin.php/comments/batchdel/` | High
34 | ... | ... | ...
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 291 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -20,7 +20,7 @@ ID | IP address | Hostname | Campaign | Confidence
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Abcbot_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Abcbot_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,6 +1,6 @@
# Adrozek - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Adrozek](https://vuldb.com/?actor.adrozek). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Adrozek](https://vuldb.com/?actor.adrozek). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.adrozek](https://vuldb.com/?actor.adrozek)
@ -10,8 +10,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 104.21.70.96 | - | - | High
2 | 172.67.222.123 | - | - | High
1 | [104.21.70.96](https://vuldb.com/?ip.104.21.70.96) | - | - | High
2 | [172.67.222.123](https://vuldb.com/?ip.172.67.222.123) | - | - | High
## References

View File

@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [US](https://vuldb.com/?country.us)
* ...
There are 9 more country items available. Please use our online service to access the data.
There are 10 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -38,7 +38,8 @@ ID | IP address | Hostname | Campaign | Confidence
15 | [34.104.35.123](https://vuldb.com/?ip.34.104.35.123) | 123.35.104.34.bc.googleusercontent.com | - | Medium
16 | [38.132.109.186](https://vuldb.com/?ip.38.132.109.186) | - | - | High
17 | [41.78.118.2](https://vuldb.com/?ip.41.78.118.2) | - | - | High
18 | ... | ... | ... | ...
18 | [41.189.230.12](https://vuldb.com/?ip.41.189.230.12) | - | - | High
19 | ... | ... | ... | ...
There are 70 more IOC items available. Please use our online service to access the data.
@ -63,53 +64,53 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.travis.yml` | Medium
2 | File | `/.env` | Low
3 | File | `/.ssh/authorized_keys` | High
4 | File | `/account/details.php` | High
5 | File | `/admin.php` | Medium
6 | File | `/admin/user/manage` | High
7 | File | `/anony/mjpg.cgi` | High
8 | File | `/artist-display.php` | High
9 | File | `/customer_demo/index2.html` | High
10 | File | `/file?action=download&file` | High
11 | File | `/home/httpd/cgi-bin/cgi.cgi` | High
12 | File | `/html/includes/graphs/port/mac_acc_total.inc.php` | High
13 | File | `/inc/subscriber_list.php` | High
14 | File | `/install/index.php` | High
15 | File | `/layout/class.xblogcomment.php` | High
16 | File | `/LEPTON_stable_2.2.2/upload/admins/admintools/tool.php` | High
17 | File | `/manager/jsp/test.jsp` | High
18 | File | `/medical/inventories.php` | High
19 | File | `/monitoring` | Medium
20 | File | `/plugins/servlet/audit/resource` | High
21 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
22 | File | `/replication` | Medium
23 | File | `/RestAPI` | Medium
24 | File | `/TeleoptiWFM/Administration/GetOneTenant` | High
25 | File | `/tmp` | Low
26 | File | `/tmp/speedtest_urls.xml` | High
27 | File | `/uncpath/` | Medium
28 | File | `/usr/bin/at` | Medium
29 | File | `/var/log/nginx` | High
30 | File | `/_vti_pvt/access.cnf` | High
31 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
32 | File | `admin/e_mesaj_yaz.asp` | High
33 | File | `admin/mcart_xls_import.php` | High
34 | File | `admin/profile.php` | High
35 | File | `admin/salesadmin.php` | High
36 | File | `admin/systemWebAdminConfig.do` | High
37 | File | `admin11.cgi` | Medium
38 | File | `admincp/auth/checklogin.php` | High
39 | File | `agenda2.php3` | Medium
40 | File | `ajax-actions.php` | High
41 | ... | ... | ...
3 | File | `/admin.php` | Medium
4 | File | `/admin/user/manage` | High
5 | File | `/anony/mjpg.cgi` | High
6 | File | `/artist-display.php` | High
7 | File | `/customer_demo/index2.html` | High
8 | File | `/file?action=download&file` | High
9 | File | `/home/httpd/cgi-bin/cgi.cgi` | High
10 | File | `/html/includes/graphs/port/mac_acc_total.inc.php` | High
11 | File | `/inc/subscriber_list.php` | High
12 | File | `/install/index.php` | High
13 | File | `/layout/class.xblogcomment.php` | High
14 | File | `/LEPTON_stable_2.2.2/upload/admins/admintools/tool.php` | High
15 | File | `/manager/jsp/test.jsp` | High
16 | File | `/medical/inventories.php` | High
17 | File | `/monitoring` | Medium
18 | File | `/plugins/servlet/audit/resource` | High
19 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
20 | File | `/public/login.htm` | High
21 | File | `/replication` | Medium
22 | File | `/RestAPI` | Medium
23 | File | `/TeleoptiWFM/Administration/GetOneTenant` | High
24 | File | `/tmp` | Low
25 | File | `/tmp/speedtest_urls.xml` | High
26 | File | `/uncpath/` | Medium
27 | File | `/usr/bin/at` | Medium
28 | File | `/var/log/nginx` | High
29 | File | `/_vti_pvt/access.cnf` | High
30 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
31 | File | `admin/e_mesaj_yaz.asp` | High
32 | File | `admin/mcart_xls_import.php` | High
33 | File | `admin/profile.php` | High
34 | File | `admin/salesadmin.php` | High
35 | File | `admin/systemWebAdminConfig.do` | High
36 | File | `admin11.cgi` | Medium
37 | File | `admincp/auth/checklogin.php` | High
38 | File | `agenda2.php3` | Medium
39 | File | `ajax-actions.php` | High
40 | ... | ... | ...
There are 349 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 347 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/ManagedGuard/AfricaBlackList/blob/main/MGAfricaIPBlackList.txt
* https://isc.sans.edu/forums/diary/Hunting+for+Phishing+Sites+Masquerading+as+Outlook+Web+Access/27974/
## Literature

View File

@ -15,11 +15,11 @@ The following _campaigns_ are known and can be associated with Agent Tesla:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Agent Tesla:
* [US](https://vuldb.com/?country.us)
* [GB](https://vuldb.com/?country.gb)
* [CN](https://vuldb.com/?country.cn)
* [ES](https://vuldb.com/?country.es)
* ...
There are 8 more country items available. Please use our online service to access the data.
There are 11 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -27,13 +27,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [69.174.99.181](https://vuldb.com/?ip.69.174.99.181) | unassigned.quadranet.com | Phishing Korea | High
2 | [149.56.200.165](https://vuldb.com/?ip.149.56.200.165) | ip165.ip-149-56-200.net | Phishing Korea | High
3 | [208.91.199.223](https://vuldb.com/?ip.208.91.199.223) | us2.outbound.mailhostbox.com | - | High
1 | [31.3.251.197](https://vuldb.com/?ip.31.3.251.197) | h31-3-251-197.host.redstation.co.uk | - | High
2 | [69.174.99.181](https://vuldb.com/?ip.69.174.99.181) | unassigned.quadranet.com | Phishing Korea | High
3 | [105.112.112.57](https://vuldb.com/?ip.105.112.112.57) | - | - | High
4 | ... | ... | ... | ...
There are 13 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Agent Tesla_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Agent Tesla_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -51,65 +54,61 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/+CSCOE+/logon.html` | High
2 | File | `/cgi-bin/wapopen` | High
3 | File | `/etc/ajenti/config.yml` | High
4 | File | `/goform/telnet` | High
5 | File | `/modules/profile/index.php` | High
6 | File | `/php/init.poll.php` | High
7 | File | `/rom-0` | Low
8 | File | `/tmp/phpglibccheck` | High
9 | File | `/uncpath/` | Medium
10 | File | `/var/tmp/sess_*` | High
11 | File | `action.php` | Medium
12 | File | `actionphp/download.File.php` | High
13 | File | `add_comment.php` | High
14 | File | `admin/admin.php` | High
15 | File | `admin/content.php` | High
16 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
17 | File | `admin/memberviewdetails.php` | High
18 | File | `admin/sitesettings.php` | High
19 | File | `affich.php` | Medium
20 | File | `agent/Core/Controller/SendRequest.cpp` | High
21 | File | `akeyActivationLogin.do` | High
22 | File | `album_portal.php` | High
23 | File | `apache-auth.conf` | High
24 | File | `askapache-firefox-adsense.php` | High
25 | File | `attachment.cgi` | High
26 | File | `basic_search_result.php` | High
27 | File | `blueprints/sections/edit/1` | High
28 | File | `books.php` | Medium
29 | File | `cart_add.php` | Medium
30 | File | `CFS.c` | Low
31 | File | `cgi-bin/gnudip.cgi` | High
32 | File | `checktransferstatus.php` | High
33 | File | `checkuser.php` | High
34 | File | `class.SystemAction.php` | High
35 | File | `clientarea.php` | High
36 | File | `cmdmon.c` | Medium
37 | File | `collectivite.class.php` | High
38 | File | `confirm.php` | Medium
39 | File | `contact` | Low
40 | File | `control.c` | Medium
41 | File | `core-util.c` | Medium
42 | File | `core/coreuserinputhandler.cpp` | High
43 | File | `d1_both.c` | Medium
44 | File | `data/gbconfiguration.dat` | High
45 | File | `Debug_command_page.asp` | High
46 | File | `details_view.php` | High
47 | File | `Diagnose.exe` | Medium
48 | File | `DigiDocSAXParser.c` | High
49 | File | `download-file.php` | High
50 | File | `download.php` | Medium
51 | File | `e/member/doaction.php` | High
52 | ... | ... | ...
2 | File | `/api/addusers` | High
3 | File | `/cgi-bin/wapopen` | High
4 | File | `/etc/ajenti/config.yml` | High
5 | File | `/goform/telnet` | High
6 | File | `/include/chart_generator.php` | High
7 | File | `/modules/profile/index.php` | High
8 | File | `/public/login.htm` | High
9 | File | `/rom-0` | Low
10 | File | `/tmp/phpglibccheck` | High
11 | File | `/uncpath/` | Medium
12 | File | `/usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php` | High
13 | File | `/var/log/nginx` | High
14 | File | `/var/tmp/sess_*` | High
15 | File | `action.php` | Medium
16 | File | `actionphp/download.File.php` | High
17 | File | `add_comment.php` | High
18 | File | `admin.a6mambocredits.php` | High
19 | File | `admin.php` | Medium
20 | File | `admin/admin.php` | High
21 | File | `admin/content.php` | High
22 | File | `admin/index.php?id=users/action=edit/user_id=1` | High
23 | File | `admin/memberviewdetails.php` | High
24 | File | `admin/sitesettings.php` | High
25 | File | `affich.php` | Medium
26 | File | `agent/Core/Controller/SendRequest.cpp` | High
27 | File | `akeyActivationLogin.do` | High
28 | File | `album_portal.php` | High
29 | File | `apache-auth.conf` | High
30 | File | `askapache-firefox-adsense.php` | High
31 | File | `attachment.cgi` | High
32 | File | `blueprints/sections/edit/1` | High
33 | File | `books.php` | Medium
34 | File | `cart_add.php` | Medium
35 | File | `category.cfm` | Medium
36 | File | `CFS.c` | Low
37 | File | `cgi-bin/gnudip.cgi` | High
38 | File | `checktransferstatus.php` | High
39 | File | `checkuser.php` | High
40 | File | `class.SystemAction.php` | High
41 | File | `clientarea.php` | High
42 | File | `cmdmon.c` | Medium
43 | File | `collectivite.class.php` | High
44 | File | `confirm.php` | Medium
45 | File | `contact` | Low
46 | File | `control.c` | Medium
47 | ... | ... | ...
There are 448 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 405 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2020/04/threat-spotlight-secret-agent-tesla
* https://services.global.ntt/en-us/insights/blog/discovering-a-new-agent-tesla-malware-sample
* https://www.fortinet.com/blog/threat-research/phishing-campaign-targeting-korean-to-deliver-agent-tesla-new-variant
## Literature

View File

@ -1,45 +1,45 @@
# Amnesia - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Amnesia](https://vuldb.com/?actor.amnesia). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Amnesia](https://vuldb.com/?actor.amnesia). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.amnesia](https://vuldb.com/?actor.amnesia)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.amnesia](https://vuldb.com/?actor.amnesia)
## Campaigns
The following campaigns are known and can be associated with Amnesia:
The following _campaigns_ are known and can be associated with Amnesia:
* TVT Digital DVR Devices
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Amnesia:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Amnesia:
* US
* IN
* NL
* [US](https://vuldb.com/?country.us)
* [IN](https://vuldb.com/?country.in)
* [NL](https://vuldb.com/?country.nl)
* ...
There are 3 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Amnesia.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Amnesia.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 93.174.95.38 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [93.174.95.38](https://vuldb.com/?ip.93.174.95.38) | - | TVT Digital DVR Devices | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Amnesia. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Amnesia_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Amnesia. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Amnesia. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -48,17 +48,17 @@ ID | Type | Indicator | Confidence
3 | File | `/public/login.htm` | High
4 | ... | ... | ...
There are 3 more IOA items available. Please use our online service to access the data.
There are 3 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# Anatsa - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Anatsa](https://vuldb.com/?actor.anatsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Anatsa](https://vuldb.com/?actor.anatsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.anatsa](https://vuldb.com/?actor.anatsa)
@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Anatsa:
* [US](https://vuldb.com/?country.us)
* [GB](https://vuldb.com/?country.gb)
## IOC - Indicator of Compromise
@ -30,6 +31,7 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | Library | `FARFLT.SYS` | Medium
2 | Argument | `wan_dyn_hostname` | High
## References

View File

@ -1,6 +1,6 @@
# ApoMacroSploit - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ApoMacroSploit](https://vuldb.com/?actor.apomacrosploit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ApoMacroSploit](https://vuldb.com/?actor.apomacrosploit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apomacrosploit](https://vuldb.com/?actor.apomacrosploit)
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with ApoMacroSploit:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -16,7 +16,7 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 185.157.161.109 | 185-157-161-109.pool.ovpn.com | - | High
1 | [185.157.161.109](https://vuldb.com/?ip.185.157.161.109) | 185-157-161-109.pool.ovpn.com | - | High
## References

View File

@ -1,61 +1,70 @@
# Armor Piercer - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Armor Piercer](https://vuldb.com/?actor.armor_piercer). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Armor Piercer](https://vuldb.com/?actor.armor_piercer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.armor_piercer](https://vuldb.com/?actor.armor_piercer)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.armor_piercer](https://vuldb.com/?actor.armor_piercer)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Armor Piercer:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Armor Piercer:
* US
* CN
* IT
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [CE](https://vuldb.com/?country.ce)
* ...
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Armor Piercer.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Armor Piercer.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.252.179.221 | no-rdns.mivocloud.com | High
2 | 45.79.81.88 | li1180-88.members.linode.com | High
3 | 64.188.13.46 | 64.188.13.46.static.quadranet.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.252.179.221](https://vuldb.com/?ip.5.252.179.221) | no-rdns.mivocloud.com | - | High
2 | [45.79.81.88](https://vuldb.com/?ip.45.79.81.88) | li1180-88.members.linode.com | - | High
3 | [64.188.13.46](https://vuldb.com/?ip.64.188.13.46) | 64.188.13.46.static.quadranet.com | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Armor Piercer_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1495 | CWE-494 | Download of Code Without Integrity Check | High
4 | ... | ... | ... | ...
There are 1 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Armor Piercer. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `app\admin\controller\sys\Uploads.php` | High
2 | File | `category.cfm` | Medium
3 | File | `itemlookup.asp` | High
4 | ... | ... | ...
1 | File | `/rapi/read_url` | High
2 | File | `/wp-admin/admin-post.php?es_skip=1&option_name` | High
3 | File | `app\admin\controller\sys\Uploads.php` | High
4 | File | `category.cfm` | Medium
5 | File | `coders/png.c` | Medium
6 | ... | ... | ...
There are 6 more IOA items available. Please use our online service to access the data.
There are 41 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/09/operation-armor-piercer.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,99 @@
# ArtFulpie - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ArtFulpie](https://vuldb.com/?actor.artfulpie). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.artfulpie](https://vuldb.com/?actor.artfulpie)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with ArtFulpie:
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* [FR](https://vuldb.com/?country.fr)
* ...
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ArtFulpie.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [193.56.28.103](https://vuldb.com/?ip.193.56.28.103) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _ArtFulpie_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by ArtFulpie. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.htaccess` | Medium
2 | File | `/admin/loginc.php` | High
3 | File | `/Applications/Calculator.app/Contents/MacOS/Calculator` | High
4 | File | `/cgi-bin/` | Medium
5 | File | `/cgi-bin/luci` | High
6 | File | `/common/info.cgi` | High
7 | File | `/config.cgi?webmin` | High
8 | File | `/data/inc/images.php` | High
9 | File | `/dev/block/mmcblk0rpmb` | High
10 | File | `/edit` | Low
11 | File | `/etc/passwd` | Medium
12 | File | `/etc/stunnel.key` | High
13 | File | `/etc/sysconfig/btrfsmaintenance` | High
14 | File | `/framework/modules/notfound/controllers/notfoundController.php` | High
15 | File | `/gadgets/definitions/uptime.CapacityWhatIfGadget/getmetrics.php` | High
16 | File | `/job-details` | Medium
17 | File | `/mib.db` | Low
18 | File | `/page/add` | Medium
19 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
20 | File | `/system-info/health` | High
21 | File | `/tmp/s48lose.tmp` | High
22 | File | `/tmp/xbindkeysrc-tmp` | High
23 | File | `/uncpath/` | Medium
24 | File | `/usr/local` | Medium
25 | File | `/var/log/nginx` | High
26 | File | `/var/run/jboss-eap/` | High
27 | File | `admin-ajax.php` | High
28 | File | `admin.jcomments.php` | High
29 | File | `admin.php` | Medium
30 | File | `admin/?n=language&c=language_general&a=doSearchParameter` | High
31 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
32 | File | `admin/admin_log/index.html?user_id` | High
33 | File | `admin/admin_menu.php` | High
34 | File | `admin/config.php` | High
35 | File | `admin/content.php` | High
36 | ... | ... | ...
There are 305 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045e
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,28 +1,28 @@
# Ashiyane - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Ashiyane](https://vuldb.com/?actor.ashiyane). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Ashiyane](https://vuldb.com/?actor.ashiyane). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.ashiyane](https://vuldb.com/?actor.ashiyane)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ashiyane](https://vuldb.com/?actor.ashiyane)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Ashiyane.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Ashiyane.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 62.171.141.97 | vmi345419.contaboserver.net | High
2 | 104.21.2.112 | - | High
3 | 172.67.129.30 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [62.171.141.97](https://vuldb.com/?ip.62.171.141.97) | vmi345419.contaboserver.net | - | High
2 | [104.21.2.112](https://vuldb.com/?ip.104.21.2.112) | - | - | High
3 | [172.67.129.30](https://vuldb.com/?ip.172.67.129.30) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://ddanchev.blogspot.com/2022/01/exposing-behrooz-kamalians-ashiyane-ict.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,32 +1,32 @@
# Astro Locker - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Astro Locker](https://vuldb.com/?actor.astro_locker). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Astro Locker](https://vuldb.com/?actor.astro_locker). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.astro_locker](https://vuldb.com/?actor.astro_locker)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.astro_locker](https://vuldb.com/?actor.astro_locker)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Astro Locker:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Astro Locker:
* US
* CN
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Astro Locker.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Astro Locker.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 45.134.21.8 | - | High
2 | 46.21.153.135 | 135.153.21.46.static.swiftway.net | High
3 | 139.60.161.68 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [45.134.21.8](https://vuldb.com/?ip.45.134.21.8) | - | - | High
2 | [46.21.153.135](https://vuldb.com/?ip.46.21.153.135) | 135.153.21.46.static.swiftway.net | - | High
3 | [139.60.161.68](https://vuldb.com/?ip.139.60.161.68) | - | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Astro Locker. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Astro Locker. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -35,17 +35,17 @@ ID | Type | Indicator | Confidence
3 | File | `ajax_php_pecl.php` | High
4 | ... | ... | ...
There are 11 more IOA items available. Please use our online service to access the data.
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/sophoslabs/IoCs/blob/master/Ransomware-AstroLocker.csv
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,31 +1,31 @@
# Aveo - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?doc.cti) of the actor known as [Aveo](https://vuldb.com/?actor.aveo). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Aveo](https://vuldb.com/?actor.aveo). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.aveo](https://vuldb.com/?actor.aveo)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.aveo](https://vuldb.com/?actor.aveo)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Aveo:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Aveo:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Aveo.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Aveo.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 50.63.202.38 | ip-50-63-202-38.ip.secureserver.net | High
2 | 104.202.173.82 | 104-202-173-82.dyn.grandenetworks.net | High
3 | 107.180.36.179 | ip-107-180-36-179.ip.secureserver.net | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [50.63.202.38](https://vuldb.com/?ip.50.63.202.38) | ip-50-63-202-38.ip.secureserver.net | - | High
2 | [104.202.173.82](https://vuldb.com/?ip.104.202.173.82) | 104-202-173-82.dyn.grandenetworks.net | - | High
3 | [107.180.36.179](https://vuldb.com/?ip.107.180.36.179) | ip-107-180-36-179.ip.secureserver.net | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Aveo. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Aveo. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -33,18 +33,18 @@ ID | Type | Indicator | Confidence
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-aveo-malware-family-targets-japanese-speaking-users/
* https://www.threatminer.org/report.php?q=AveoMalwareFamilyTargetsJapaneseSpeakingUsers-PaloAltoNetworksBlogPaloAltoNetworksBlog.pdf&y=2016
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?doc.cti)
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2021](https://vuldb.com/?doc.changelog) by [vuldb.com](https://vuldb.com/?doc.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?doc.faq), read the [documentation](https://vuldb.com/?doc) or [contact us](https://vuldb.com/?contact)!
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

68
actors/Azorult/README.md Normal file
View File

@ -0,0 +1,68 @@
# Azorult - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Azorult](https://vuldb.com/?actor.azorult). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.azorult](https://vuldb.com/?actor.azorult)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Azorult:
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [FR](https://vuldb.com/?country.fr)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Azorult.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [149.129.216.194](https://vuldb.com/?ip.149.129.216.194) | - | - | High
2 | [209.141.59.124](https://vuldb.com/?ip.209.141.59.124) | buyvm.mpipalia.com | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Azorult_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1222 | CWE-275 | Permission Issues | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Azorult. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
2 | File | `components/bitrix/mobileapp.list/ajax.php/` | High
3 | File | `hbs` | Low
4 | ... | ... | ...
There are 10 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/More+malspam+pushing+passwordprotected+Word+docs+for+AZORult+and+Hermes+Ransomware/23992/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [SC](https://vuldb.com/?country.sc)
* [UA](https://vuldb.com/?country.ua)
* ...
There are 9 more country items available. Please use our online service to access the data.
There are 11 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -45,12 +45,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
1 | T1008 | CWE-757 | Algorithm Downgrade | High
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 9 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -59,17 +59,17 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin-panel1.php` | High
2 | File | `/admin.php/admin/art/data.html` | High
3 | File | `/admin.php/admin/plog/index.html` | High
4 | File | `/admin.php/admin/ulog/index.html` | High
5 | File | `/admin.php/admin/vod/data.html` | High
6 | File | `/admin/files` | Medium
6 | File | `/admin.php/admin/website/data.html` | High
7 | File | `/admin/login.php` | High
8 | File | `/admin/news/news_mod.php` | High
9 | File | `/admin/news/news_ok.php` | High
10 | File | `/admin/options` | High
11 | File | `/admin/page_edit/3` | High
12 | File | `/admin/templates/template_manage.php` | High
10 | File | `/admin/templates/template_manage.php` | High
11 | File | `/api /v3/auth` | High
12 | File | `/app/controller/Books.php` | High
13 | File | `/cgi-bin/uploadAccessCodePic` | High
14 | File | `/cgi-bin/uploadWeiXinPic` | High
15 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
@ -80,12 +80,15 @@ ID | Type | Indicator | Confidence
20 | File | `/data/sqldata` | High
21 | File | `/DataPackageTable` | High
22 | File | `/download/` | Medium
23 | File | `/etc/passwd` | Medium
24 | File | `/factor/avx-ecm/vecarith52.c` | High
25 | File | `/goform/delAd` | High
26 | ... | ... | ...
23 | File | `/factor/avx-ecm/vecarith52.c` | High
24 | File | `/goform/delAd` | High
25 | File | `/goform/exeCommand` | High
26 | File | `/goform/form2Reboot.cgi` | High
27 | File | `/goform/setAdInfoDetail` | High
28 | File | `/goform/setFixTools` | High
29 | ... | ... | ...
There are 215 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 249 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,49 +1,49 @@
# BEAR - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BEAR](https://vuldb.com/?actor.bear). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BEAR](https://vuldb.com/?actor.bear). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bear](https://vuldb.com/?actor.bear)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bear](https://vuldb.com/?actor.bear)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BEAR:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BEAR:
* EE
* US
* UA
* [EE](https://vuldb.com/?country.ee)
* [US](https://vuldb.com/?country.us)
* [UA](https://vuldb.com/?country.ua)
* ...
There are 4 more country items available. Please use our online service to access the data.
There are 5 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BEAR.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BEAR.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.149.248.67 | mx1-mail.com | High
2 | 5.149.248.193 | - | High
3 | 5.149.249.172 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.149.248.67](https://vuldb.com/?ip.5.149.248.67) | mx1-mail.com | - | High
2 | [5.149.248.193](https://vuldb.com/?ip.5.149.248.193) | - | - | High
3 | [5.149.249.172](https://vuldb.com/?ip.5.149.249.172) | - | - | High
4 | ... | ... | ... | ...
There are 3 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BEAR. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BEAR_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1211 | 7PK Security Features | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BEAR. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BEAR. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -52,18 +52,18 @@ ID | Type | Indicator | Confidence
3 | File | `add_comment.php` | High
4 | ... | ... | ...
There are 24 more IOA items available. Please use our online service to access the data.
There are 24 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=CanaBEARFitDownaRabbitHole_StateBoardofElectionAnalysis-ThreatConnect.pdf&y=2016
* https://www.threatminer.org/report.php?q=RussiaHacksBellingcatMH17Investigation_ThreatConnect.pdf&y=2016
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,32 +1,32 @@
# BabyShark - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BabyShark](https://vuldb.com/?actor.babyshark). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BabyShark](https://vuldb.com/?actor.babyshark). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.babyshark](https://vuldb.com/?actor.babyshark)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babyshark](https://vuldb.com/?actor.babyshark)
## Campaigns
The following campaigns are known and can be associated with BabyShark:
The following _campaigns_ are known and can be associated with BabyShark:
* BabyShark
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BabyShark.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BabyShark.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 173.248.170.149 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [173.248.170.149](https://vuldb.com/?ip.173.248.170.149) | - | BabyShark | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/_reports/2019/BabySharkMalwarePartTwo%E2%80%93AttacksContinueUsingKimJongRATandPCRat.pdf#viewer.action=download
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# BackdoorDiplomacy - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BackdoorDiplomacy](https://vuldb.com/?actor.backdoordiplomacy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BackdoorDiplomacy](https://vuldb.com/?actor.backdoordiplomacy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.backdoordiplomacy](https://vuldb.com/?actor.backdoordiplomacy)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BackdoorDiplomacy:
* US
* CN
* RU
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 24 more country items available. Please use our online service to access the data.
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 23.83.224.178 | 23.83.224.178.16clouds.com | - | High
2 | 23.106.140.207 | 23.106.140.207.16clouds.com | - | High
3 | 23.228.203.130 | unassigned.psychz.net | - | High
1 | [23.83.224.178](https://vuldb.com/?ip.23.83.224.178) | 23.83.224.178.16clouds.com | - | High
2 | [23.106.140.207](https://vuldb.com/?ip.23.106.140.207) | 23.106.140.207.16clouds.com | - | High
3 | [23.228.203.130](https://vuldb.com/?ip.23.228.203.130) | unassigned.psychz.net | - | High
4 | ... | ... | ... | ...
There are 14 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BackdoorDiplomacy. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BackdoorDiplomacy_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -71,31 +71,32 @@ ID | Type | Indicator | Confidence
22 | File | `/password.html` | High
23 | File | `/proc/ioports` | High
24 | File | `/property-list/property_view.php` | High
25 | File | `/rest` | Low
26 | File | `/rest/api/2/search` | High
27 | File | `/s/` | Low
28 | File | `/scripts/cpan_config` | High
29 | File | `/services/system/setup.json` | High
30 | File | `/uncpath/` | Medium
31 | File | `/webconsole/APIController` | High
32 | File | `/websocket/exec` | High
33 | File | `/wp-admin/admin-ajax.php` | High
34 | File | `/wp-json/oembed/1.0/embed?url` | High
35 | File | `/_next` | Low
36 | File | `4.edu.php\conn\function.php` | High
37 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
38 | File | `adclick.php` | Medium
39 | File | `addentry.php` | Medium
40 | File | `addressbook.php` | High
41 | File | `add_comment.php` | High
42 | File | `admin/category.inc.php` | High
43 | File | `admin/conf_users_edit.php` | High
44 | File | `admin/dl_sendmail.php` | High
45 | File | `admin/index.php` | High
46 | File | `admin/password_forgotten.php` | High
47 | ... | ... | ...
25 | File | `/ptms/classes/Users.php` | High
26 | File | `/rest` | Low
27 | File | `/rest/api/2/search` | High
28 | File | `/s/` | Low
29 | File | `/scripts/cpan_config` | High
30 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
31 | File | `/services/system/setup.json` | High
32 | File | `/uncpath/` | Medium
33 | File | `/webconsole/APIController` | High
34 | File | `/websocket/exec` | High
35 | File | `/wp-admin/admin-ajax.php` | High
36 | File | `/wp-json/oembed/1.0/embed?url` | High
37 | File | `/_next` | Low
38 | File | `4.edu.php\conn\function.php` | High
39 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
40 | File | `adclick.php` | Medium
41 | File | `addentry.php` | Medium
42 | File | `add_comment.php` | High
43 | File | `admin/category.inc.php` | High
44 | File | `admin/conf_users_edit.php` | High
45 | File | `admin/dl_sendmail.php` | High
46 | File | `admin/index.php` | High
47 | File | `admin/password_forgotten.php` | High
48 | ... | ... | ...
There are 411 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 415 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,27 +1,27 @@
# BadPatch - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BadPatch](https://vuldb.com/?actor.badpatch). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BadPatch](https://vuldb.com/?actor.badpatch). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.badpatch](https://vuldb.com/?actor.badpatch)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.badpatch](https://vuldb.com/?actor.badpatch)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BadPatch:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BadPatch:
* DE
* [DE](https://vuldb.com/?country.de)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BadPatch.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BadPatch.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 148.251.135.117 | server.pogled.ba | High
2 | 195.154.216.74 | 195-154-216-74.rev.poneytelecom.eu | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [148.251.135.117](https://vuldb.com/?ip.148.251.135.117) | server.pogled.ba | - | High
2 | [195.154.216.74](https://vuldb.com/?ip.195.154.216.74) | 195-154-216-74.rev.poneytelecom.eu | - | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BadPatch. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BadPatch. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -30,17 +30,17 @@ ID | Type | Indicator | Confidence
3 | Argument | `PagePrefix` | Medium
4 | ... | ... | ...
There are 1 more IOA items available. Please use our online service to access the data.
There are 1 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=BadPatch-PaloAltoNetworks.pdf&y=2017
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -101,7 +101,7 @@ ID | Type | Indicator | Confidence
35 | File | `api/v1/alarms` | High
36 | ... | ... | ...
There are 306 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 305 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -30,7 +30,7 @@ There are 1 more IOC items available. Please use our online service to access th
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Bandook_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bandook_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,55 +1,55 @@
# Banload - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Banload](https://vuldb.com/?actor.banload). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Banload](https://vuldb.com/?actor.banload). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.banload](https://vuldb.com/?actor.banload)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.banload](https://vuldb.com/?actor.banload)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Banload:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Banload:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Banload.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Banload.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 13.107.21.200 | - | High
2 | 31.13.66.19 | xx-fbcdn-shv-01-iad3.fbcdn.net | High
3 | 34.102.185.99 | 99.185.102.34.bc.googleusercontent.com | Medium
4 | 34.212.89.14 | ec2-34-212-89-14.us-west-2.compute.amazonaws.com | Medium
5 | 52.95.165.35 | s3-sa-east-1.amazonaws.com | Medium
6 | 52.216.76.254 | s3-1.amazonaws.com | Medium
7 | 52.216.84.109 | s3-1.amazonaws.com | Medium
8 | 52.216.129.45 | s3-1.amazonaws.com | Medium
9 | 52.216.245.54 | s3-1.amazonaws.com | Medium
10 | 52.217.33.190 | s3-1.amazonaws.com | Medium
11 | 52.217.45.150 | s3-1.amazonaws.com | Medium
12 | 52.217.48.70 | s3-1.amazonaws.com | Medium
13 | 52.217.79.142 | s3-1.amazonaws.com | Medium
14 | 52.217.85.222 | s3-1.amazonaws.com | Medium
15 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
2 | [31.13.66.19](https://vuldb.com/?ip.31.13.66.19) | xx-fbcdn-shv-01-iad3.fbcdn.net | - | High
3 | [34.102.185.99](https://vuldb.com/?ip.34.102.185.99) | 99.185.102.34.bc.googleusercontent.com | - | Medium
4 | [34.212.89.14](https://vuldb.com/?ip.34.212.89.14) | ec2-34-212-89-14.us-west-2.compute.amazonaws.com | - | Medium
5 | [52.95.165.35](https://vuldb.com/?ip.52.95.165.35) | s3-sa-east-1.amazonaws.com | - | Medium
6 | [52.216.76.254](https://vuldb.com/?ip.52.216.76.254) | s3-1.amazonaws.com | - | Medium
7 | [52.216.84.109](https://vuldb.com/?ip.52.216.84.109) | s3-1.amazonaws.com | - | Medium
8 | [52.216.129.45](https://vuldb.com/?ip.52.216.129.45) | s3-1.amazonaws.com | - | Medium
9 | [52.216.245.54](https://vuldb.com/?ip.52.216.245.54) | s3-1.amazonaws.com | - | Medium
10 | [52.217.33.190](https://vuldb.com/?ip.52.217.33.190) | s3-1.amazonaws.com | - | Medium
11 | [52.217.45.150](https://vuldb.com/?ip.52.217.45.150) | s3-1.amazonaws.com | - | Medium
12 | [52.217.48.70](https://vuldb.com/?ip.52.217.48.70) | s3-1.amazonaws.com | - | Medium
13 | [52.217.79.142](https://vuldb.com/?ip.52.217.79.142) | s3-1.amazonaws.com | - | Medium
14 | [52.217.85.222](https://vuldb.com/?ip.52.217.85.222) | s3-1.amazonaws.com | - | Medium
15 | ... | ... | ... | ...
There are 56 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Banload. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Banload_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 4 more TTP items available. Please use our online service to access the data.
There are 3 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Banload. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Banload. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -61,11 +61,11 @@ ID | Type | Indicator | Confidence
6 | File | `/oauth/authorize` | High
7 | ... | ... | ...
There are 45 more IOA items available. Please use our online service to access the data.
There are 45 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/02/threat-roundup-0129-0205.html
* https://blog.talosintelligence.com/2021/03/threat-roundup-0319-0326.html
@ -73,7 +73,7 @@ The following list contains external sources which discuss the actor and the ass
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -10,13 +10,15 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
1 | [185.244.25.200](https://vuldb.com/?ip.185.244.25.200) | - | - | High
2 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.trendmicro.co.jp/archives/20879
* https://blog.trendmicro.co.jp/archives/22211
## Literature

View File

@ -1,48 +1,45 @@
# BelialDemon - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BelialDemon](https://vuldb.com/?actor.belialdemon). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BelialDemon](https://vuldb.com/?actor.belialdemon). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.belialdemon](https://vuldb.com/?actor.belialdemon)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.belialdemon](https://vuldb.com/?actor.belialdemon)
## Campaigns
The following campaigns are known and can be associated with BelialDemon:
The following _campaigns_ are known and can be associated with BelialDemon:
* Matanbuchus
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BelialDemon:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BelialDemon:
* TT
* CO
* [TT](https://vuldb.com/?country.tt)
* [CO](https://vuldb.com/?country.co)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BelialDemon.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BelialDemon.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 34.94.151.129 | 129.151.94.34.bc.googleusercontent.com | Medium
2 | 34.105.89.82 | 82.89.105.34.bc.googleusercontent.com | Medium
3 | 34.106.243.174 | 174.243.106.34.bc.googleusercontent.com | Medium
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [34.94.151.129](https://vuldb.com/?ip.34.94.151.129) | 129.151.94.34.bc.googleusercontent.com | Matanbuchus | Medium
2 | [34.105.89.82](https://vuldb.com/?ip.34.105.89.82) | 82.89.105.34.bc.googleusercontent.com | Matanbuchus | Medium
3 | [34.106.243.174](https://vuldb.com/?ip.34.106.243.174) | 174.243.106.34.bc.googleusercontent.com | Matanbuchus | Medium
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BelialDemon_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1499 | Resource Consumption | High
4 | ... | ... | ...
There are 1 more TTP items available. Please use our online service to access the data.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
3 | T1548.002 | CWE-285 | Improper Authorization | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BelialDemon. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -52,13 +49,13 @@ ID | Type | Indicator | Confidence
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,43 +1,43 @@
# Bifrost - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bifrost](https://vuldb.com/?actor.bifrost). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bifrost](https://vuldb.com/?actor.bifrost). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bifrost](https://vuldb.com/?actor.bifrost)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bifrost](https://vuldb.com/?actor.bifrost)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bifrost:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bifrost:
* ES
* [ES](https://vuldb.com/?country.es)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bifrost.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bifrost.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 104.18.10.39 | - | High
2 | 172.105.155.183 | li2071-183.members.linode.com | High
3 | 173.194.5.216 | lhr25s06-in-f8.1e100.net | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [104.18.10.39](https://vuldb.com/?ip.104.18.10.39) | - | - | High
2 | [172.105.155.183](https://vuldb.com/?ip.172.105.155.183) | li2071-183.members.linode.com | - | High
3 | [173.194.5.216](https://vuldb.com/?ip.173.194.5.216) | lhr25s06-in-f8.1e100.net | - | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bifrost. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bifrost_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/04/threat-roundup-0402-0409.html
* https://blog.talosintelligence.com/2021/05/threat-roundup-0430-0507.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# Bigviktor - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bigviktor](https://vuldb.com/?actor.bigviktor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bigviktor](https://vuldb.com/?actor.bigviktor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bigviktor](https://vuldb.com/?actor.bigviktor)
@ -16,8 +16,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 91.219.75.87 | - | CVE-2020-8515 | High
2 | 151.80.235.228 | 228.ip-151-80-235.eu | CVE-2020-8515 | High
1 | [91.219.75.87](https://vuldb.com/?ip.91.219.75.87) | - | CVE-2020-8515 | High
2 | [151.80.235.228](https://vuldb.com/?ip.151.80.235.228) | 228.ip-151-80-235.eu | CVE-2020-8515 | High
## References

View File

@ -1,27 +1,27 @@
# Bisonal - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bisonal](https://vuldb.com/?actor.bisonal). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bisonal](https://vuldb.com/?actor.bisonal). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bisonal](https://vuldb.com/?actor.bisonal)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bisonal](https://vuldb.com/?actor.bisonal)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bisonal.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bisonal.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 116.193.155.38 | - | High
2 | 196.44.49.154 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [116.193.155.38](https://vuldb.com/?ip.116.193.155.38) | - | - | High
2 | [196.44.49.154](https://vuldb.com/?ip.196.44.49.154) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=BisonalMalwareUsedinAttacksAgainstRussiaandSouthKorea-PaloAltoNetworksBlog.pdf&y=2018
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,49 @@
# Bistromath - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bistromath](https://vuldb.com/?actor.bistromath). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bistromath](https://vuldb.com/?actor.bistromath)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bistromath:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bistromath.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [159.100.250.231](https://vuldb.com/?ip.159.100.250.231) | - | - | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bistromath. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `admin/login.asp` | High
2 | File | `cat.php` | Low
3 | Argument | `CatID` | Low
4 | ... | ... | ...
There are 1 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045a
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [US](https://vuldb.com/?country.us)
* [CO](https://vuldb.com/?country.co)
* [IT](https://vuldb.com/?country.it)
* [GB](https://vuldb.com/?country.gb)
* ...
There are 16 more country items available. Please use our online service to access the data.
There are 17 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [82.221.129.17](https://vuldb.com/?ip.82.221.129.17) | hengill.orangewebsite.com | - | High
2 | [82.221.129.18](https://vuldb.com/?ip.82.221.129.18) | baula.orangewebsite.com | - | High
3 | [82.221.129.19](https://vuldb.com/?ip.82.221.129.19) | jolnir.orangewebsite.com | - | High
1 | [45.11.19.170](https://vuldb.com/?ip.45.11.19.170) | - | - | High
2 | [82.221.129.17](https://vuldb.com/?ip.82.221.129.17) | hengill.orangewebsite.com | - | High
3 | [82.221.129.18](https://vuldb.com/?ip.82.221.129.18) | baula.orangewebsite.com | - | High
4 | ... | ... | ... | ...
There are 8 more IOC items available. Please use our online service to access the data.
There are 9 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Bitter_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bitter_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -51,23 +51,25 @@ ID | Type | Indicator | Confidence
2 | File | `/etc/gsissh/sshd_config` | High
3 | File | `/forms/nslookupHandler` | High
4 | File | `/news.dtl.php` | High
5 | File | `/systemrw/` | Medium
6 | File | `/uncpath/` | Medium
7 | File | `/upload/file.php` | High
8 | File | `/wp-content/plugins/woocommerce/templates/emails/plain/` | High
9 | File | `5.2.9\syscrb.exe` | High
10 | File | `admin.cgi` | Medium
11 | File | `admin/category.inc.php` | High
12 | File | `data/gbconfiguration.dat` | High
13 | ... | ... | ...
5 | File | `/ptms/?page=user` | High
6 | File | `/systemrw/` | Medium
7 | File | `/uncpath/` | Medium
8 | File | `/upload/file.php` | High
9 | File | `/wp-content/plugins/woocommerce/templates/emails/plain/` | High
10 | File | `5.2.9\syscrb.exe` | High
11 | File | `admin.cgi` | Medium
12 | File | `admin/category.inc.php` | High
13 | File | `admin/vqmods.app/vqmods.inc.php` | High
14 | ... | ... | ...
There are 99 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 111 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
* https://twitter.com/ShadowChasing1/status/1504833720489951234
* https://www.threatminer.org/report.php?q=SuspectedBITTERAPTContinuesTargetingGovernmentofChinaandChineseOrganizations.pdf&y=2019
## Literature

View File

@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [FR](https://vuldb.com/?country.fr)
* ...
There are 8 more country items available. Please use our online service to access the data.
There are 9 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -34,12 +34,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
1 | T1008 | CWE-757 | Algorithm Downgrade | High
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
4 | ... | ... | ... | ...
There are 9 more TTP items available. Please use our online service to access the data.
There are 10 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -49,21 +49,21 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin-panel1.php` | High
3 | File | `/admin.php/admin/ulog/index.html` | High
4 | File | `/admin.php/admin/vod/data.html` | High
5 | File | `/admin/login.php` | High
6 | File | `/admin/templates/template_manage.php` | High
7 | File | `/api/servers` | Medium
8 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
9 | File | `/cgi-bin/uploadAccessCodePic` | High
10 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
11 | File | `/cloud_config/router_post/upgrade_info` | High
12 | File | `/core/admin/comment.php` | High
13 | File | `/data/sqldata` | High
14 | File | `/DataPackageTable` | High
15 | File | `/download/` | Medium
16 | File | `/etc/passwd` | Medium
17 | File | `/etc/wpa_supplicant.conf` | High
3 | File | `/admin.php/admin/art/data.html` | High
4 | File | `/admin.php/admin/ulog/index.html` | High
5 | File | `/admin.php/admin/vod/data.html` | High
6 | File | `/admin/login.php` | High
7 | File | `/admin/templates/template_manage.php` | High
8 | File | `/api/servers` | Medium
9 | File | `/api /v3/auth` | High
10 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
11 | File | `/cgi-bin/uploadAccessCodePic` | High
12 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
13 | File | `/cloud_config/router_post/upgrade_info` | High
14 | File | `/data/sqldata` | High
15 | File | `/DataPackageTable` | High
16 | File | `/download/` | Medium
17 | File | `/etc/passwd` | Medium
18 | File | `/factor/avx-ecm/vecarith52.c` | High
19 | File | `/goform/delAd` | High
20 | File | `/goform/form2Reboot.cgi` | High
@ -72,9 +72,10 @@ ID | Type | Indicator | Confidence
23 | File | `/i/:data/ipa.plist` | High
24 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
25 | File | `/js/js-parser.c` | High
26 | ... | ... | ...
26 | File | `/mdiy/dict/listExcludeApp` | High
27 | ... | ... | ...
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 232 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,26 +1,26 @@
# Black Vine - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Black Vine](https://vuldb.com/?actor.black_vine). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Black Vine](https://vuldb.com/?actor.black_vine). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.black_vine](https://vuldb.com/?actor.black_vine)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.black_vine](https://vuldb.com/?actor.black_vine)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Black Vine.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Black Vine.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 192.199.254.126 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [192.199.254.126](https://vuldb.com/?ip.192.199.254.126) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=the-black-vine-cyberespionage-group.pdf&y=2015
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# BlackByte - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackByte](https://vuldb.com/?actor.blackbyte). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackByte](https://vuldb.com/?actor.blackbyte). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blackbyte](https://vuldb.com/?actor.blackbyte)
@ -8,8 +8,8 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackByte:
* US
* ES
* [US](https://vuldb.com/?country.us)
* [ES](https://vuldb.com/?country.es)
## IOC - Indicator of Compromise
@ -17,11 +17,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 45.9.148.114 | - | - | High
1 | [45.9.148.114](https://vuldb.com/?ip.45.9.148.114) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BlackByte. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackByte_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -30,7 +30,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack

View File

@ -0,0 +1,84 @@
# BlackEnergy - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackEnergy](https://vuldb.com/?actor.blackenergy). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blackenergy](https://vuldb.com/?actor.blackenergy)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackEnergy:
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [UA](https://vuldb.com/?country.ua)
* ...
There are 14 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackEnergy.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.9.32.230](https://vuldb.com/?ip.5.9.32.230) | static.230.32.9.5.clients.your-server.de | - | High
2 | [5.61.38.31](https://vuldb.com/?ip.5.61.38.31) | - | - | High
3 | [5.79.80.166](https://vuldb.com/?ip.5.79.80.166) | - | - | High
4 | [5.149.254.114](https://vuldb.com/?ip.5.149.254.114) | mail1.auditoriavanzada.info | - | High
5 | [5.255.87.39](https://vuldb.com/?ip.5.255.87.39) | - | - | High
6 | [31.210.111.154](https://vuldb.com/?ip.31.210.111.154) | - | - | High
7 | ... | ... | ... | ...
There are 23 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackEnergy_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackEnergy. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/BRS_netgear_success.html` | High
2 | File | `/uncpath/` | Medium
3 | File | `/usr/bin/pkexec` | High
4 | File | `/var/log/nginx` | High
5 | File | `/webapps/blogs-journals/execute/editBlogEntry` | High
6 | File | `/wordpress/wp-admin/admin.php` | High
7 | File | `/wp-json` | Medium
8 | File | `adclick.php` | Medium
9 | File | `add.php` | Low
10 | File | `add.php/del.php` | High
11 | File | `add_comment.php` | High
12 | File | `admin/adminsignin.html` | High
13 | ... | ... | ...
There are 105 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* http://blogs.mcafee.jp/blackenergy-cb6d
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,71 +1,63 @@
# BlackNet - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?doc.cti) of the actor known as [BlackNet](https://vuldb.com/?actor.blacknet). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackNet](https://vuldb.com/?actor.blacknet). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.blacknet](https://vuldb.com/?actor.blacknet)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blacknet](https://vuldb.com/?actor.blacknet)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackNet:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackNet:
* US
* NL
* [US](https://vuldb.com/?country.us)
* [NL](https://vuldb.com/?country.nl)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BlackNet.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackNet.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 1.1.1.1 | one.one.one.one | High
2 | 37.221.67.91 | - | High
3 | 45.133.1.98 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [1.1.1.1](https://vuldb.com/?ip.1.1.1.1) | one.one.one.one | - | High
2 | [37.221.67.91](https://vuldb.com/?ip.37.221.67.91) | - | - | High
3 | [45.133.1.98](https://vuldb.com/?ip.45.133.1.98) | - | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BlackNet. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackNet_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1499 | Resource Consumption | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackNet. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackNet. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/about.php` | Medium
2 | File | `/it-IT/splunkd/__raw/services/get_snapshot` | High
3 | File | `/phpwcms/setup/setup.php` | High
4 | File | `category.cfm` | Medium
5 | File | `comersus_optreviewreadexec.asp` | High
6 | File | `data/gbconfiguration.dat` | High
7 | File | `index.php` | Medium
8 | File | `item_show.php` | High
9 | File | `wp-postratings.php` | High
10 | Argument | `cat` | Low
11 | ... | ... | ...
4 | ... | ... | ...
There are 7 more IOA items available. Please use our online service to access the data.
There are 15 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/06/threat-roundup-0528-0604.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?doc.cti)
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2021](https://vuldb.com/?doc.changelog) by [vuldb.com](https://vuldb.com/?doc.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?doc.faq), read the [documentation](https://vuldb.com/?doc) or [contact us](https://vuldb.com/?contact)!
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,48 +1,47 @@
# Bookworm - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bookworm](https://vuldb.com/?actor.bookworm). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bookworm](https://vuldb.com/?actor.bookworm). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bookworm](https://vuldb.com/?actor.bookworm)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bookworm](https://vuldb.com/?actor.bookworm)
## Campaigns
The following campaigns are known and can be associated with Bookworm:
The following _campaigns_ are known and can be associated with Bookworm:
* Thailand
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bookworm:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bookworm:
* US
* CN
* KR
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [KR](https://vuldb.com/?country.kr)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bookworm.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bookworm.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 43.248.8.249 | - | High
2 | 103.226.127.47 | - | High
3 | 104.156.239.105 | 104.156.239.105.vultr.com | Medium
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [43.248.8.249](https://vuldb.com/?ip.43.248.8.249) | - | Thailand | High
2 | [103.226.127.47](https://vuldb.com/?ip.103.226.127.47) | - | Thailand | High
3 | [104.156.239.105](https://vuldb.com/?ip.104.156.239.105) | 104.156.239.105.vultr.com | Thailand | Medium
4 | ... | ... | ... | ...
There are 8 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bookworm. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bookworm_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1499 | Resource Consumption | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bookworm. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bookworm. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -51,17 +50,17 @@ ID | Type | Indicator | Confidence
3 | File | `cirrus_vga.c` | Medium
4 | ... | ... | ...
There are 6 more IOA items available. Please use our online service to access the data.
There are 6 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/attack-campaign-on-the-government-of-thailand-delivers-bookworm-trojan/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# Bouncing Golf - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bouncing Golf](https://vuldb.com/?actor.bouncing_golf). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bouncing Golf](https://vuldb.com/?actor.bouncing_golf). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bouncing_golf](https://vuldb.com/?actor.bouncing_golf)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bouncing Golf:
* US
* FR
* GB
* [US](https://vuldb.com/?country.us)
* [FR](https://vuldb.com/?country.fr)
* [GB](https://vuldb.com/?country.gb)
* ...
There are 21 more country items available. Please use our online service to access the data.
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 54.38.51.159 | - | - | High
2 | 82.211.31.181 | - | - | High
3 | 84.234.96.167 | eronn.erivermle.com | - | High
1 | [54.38.51.159](https://vuldb.com/?ip.54.38.51.159) | - | - | High
2 | [82.211.31.181](https://vuldb.com/?ip.82.211.31.181) | - | - | High
3 | [84.234.96.167](https://vuldb.com/?ip.84.234.96.167) | eronn.erivermle.com | - | High
4 | ... | ... | ... | ...
There are 4 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Bouncing Golf. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bouncing Golf_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -55,24 +55,24 @@ ID | Type | Indicator | Confidence
6 | File | `/forum/away.php` | High
7 | File | `/get_getnetworkconf.cgi` | High
8 | File | `/horde/util/go.php` | High
9 | File | `/new` | Low
10 | File | `/show_news.php` | High
11 | File | `/tmp` | Low
12 | File | `/uncpath/` | Medium
13 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
14 | File | `/ViewUserHover.jspa` | High
15 | File | `AccountStatus.jsp` | High
16 | File | `adclick.php` | Medium
17 | File | `add.php` | Low
18 | File | `admin/systemOutOfBand.do` | High
19 | File | `app/application.cpp` | High
20 | File | `auth-gss2.c` | Medium
21 | File | `authent.php4` | Medium
22 | File | `base_maintenance.php` | High
23 | File | `boardrule.php` | High
9 | File | `/mobile_seal/get_seal.php` | High
10 | File | `/new` | Low
11 | File | `/nova/bin/detnet` | High
12 | File | `/show_news.php` | High
13 | File | `/tmp` | Low
14 | File | `/uncpath/` | Medium
15 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
16 | File | `/ViewUserHover.jspa` | High
17 | File | `AccountStatus.jsp` | High
18 | File | `adclick.php` | Medium
19 | File | `add.php` | Low
20 | File | `admin/systemOutOfBand.do` | High
21 | File | `app/application.cpp` | High
22 | File | `auth-gss2.c` | Medium
23 | File | `authent.php4` | Medium
24 | ... | ... | ...
There are 198 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 201 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,40 +1,40 @@
# Brazil Unknown - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Brazil Unknown](https://vuldb.com/?actor.brazil_unknown). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Brazil Unknown](https://vuldb.com/?actor.brazil_unknown). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.brazil_unknown](https://vuldb.com/?actor.brazil_unknown)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.brazil_unknown](https://vuldb.com/?actor.brazil_unknown)
## Campaigns
The following campaigns are known and can be associated with Brazil Unknown:
The following _campaigns_ are known and can be associated with Brazil Unknown:
* Boleto Mestre
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Brazil Unknown:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Brazil Unknown:
* US
* NP
* [US](https://vuldb.com/?country.us)
* [NP](https://vuldb.com/?country.np)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Brazil Unknown.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Brazil Unknown.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 65.181.113.87 | mx1.lifestylefundings.com | High
2 | 65.181.127.152 | portal2.brewmyidea.com | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [65.181.113.87](https://vuldb.com/?ip.65.181.113.87) | mx1.lifestylefundings.com | Boleto Mestre | High
2 | [65.181.127.152](https://vuldb.com/?ip.65.181.127.152) | portal2.brewmyidea.com | Boleto Mestre | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-master-channel-the-boleto-mestre-campaign-targets-brazil/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# Bronze Butler - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Butler](https://vuldb.com/?actor.bronze_butler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Butler](https://vuldb.com/?actor.bronze_butler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bronze_butler](https://vuldb.com/?actor.bronze_butler)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Butler:
* US
* CN
* KR
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [KR](https://vuldb.com/?country.kr)
* ...
There are 1 more country items available. Please use our online service to access the data.
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 27.255.69.209 | - | - | High
2 | 27.255.91.238 | - | - | High
3 | 106.184.5.30 | - | - | High
1 | [27.255.69.209](https://vuldb.com/?ip.27.255.69.209) | - | - | High
2 | [27.255.91.238](https://vuldb.com/?ip.27.255.91.238) | - | - | High
3 | [106.184.5.30](https://vuldb.com/?ip.106.184.5.30) | - | - | High
4 | ... | ... | ... | ...
There are 3 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Bronze Butler. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bronze Butler_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,45 +1,42 @@
# Bronze Union - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Union](https://vuldb.com/?actor.bronze_union). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bronze Union](https://vuldb.com/?actor.bronze_union). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bronze_union](https://vuldb.com/?actor.bronze_union)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bronze_union](https://vuldb.com/?actor.bronze_union)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Union:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bronze Union:
* CN
* US
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bronze Union.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bronze Union.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 45.114.9.174 | - | High
2 | 96.90.63.57 | nleq.com | High
3 | 117.136.63.145 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [45.114.9.174](https://vuldb.com/?ip.45.114.9.174) | - | - | High
2 | [96.90.63.57](https://vuldb.com/?ip.96.90.63.57) | nleq.com | - | High
3 | [117.136.63.145](https://vuldb.com/?ip.117.136.63.145) | - | - | High
4 | ... | ... | ... | ...
There are 7 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Bronze Union_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1499 | Resource Consumption | High
4 | ... | ... | ...
There are 1 more TTP items available. Please use our online service to access the data.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
3 | T1548.002 | CWE-285 | Improper Authorization | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Bronze Union. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -48,17 +45,17 @@ ID | Type | Indicator | Confidence
3 | File | `public/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]` | High
4 | ... | ... | ...
There are 5 more IOA items available. Please use our online service to access the data.
There are 5 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=BRONZEUNIONCyberespionagePersistsDespiteDisclosures_SecureWorks.pdf&y=2017
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,31 +1,31 @@
# Bublik - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bublik](https://vuldb.com/?actor.bublik). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bublik](https://vuldb.com/?actor.bublik). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.bublik](https://vuldb.com/?actor.bublik)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bublik](https://vuldb.com/?actor.bublik)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Bublik.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bublik.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 66.128.53.179 | - | High
2 | 104.21.57.186 | - | High
3 | 157.240.2.35 | edge-star-mini-shv-01-ort2.facebook.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [66.128.53.179](https://vuldb.com/?ip.66.128.53.179) | - | - | High
2 | [104.21.57.186](https://vuldb.com/?ip.104.21.57.186) | - | - | High
3 | [157.240.2.35](https://vuldb.com/?ip.157.240.2.35) | edge-star-mini-shv-01-ort2.facebook.com | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/05/threat-roundup-0507-0514.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,31 @@
# BuffetLine - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BuffetLine](https://vuldb.com/?actor.buffetline). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.buffetline](https://vuldb.com/?actor.buffetline)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BuffetLine.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [107.6.12.135](https://vuldb.com/?ip.107.6.12.135) | - | - | High
2 | [210.202.40.35](https://vuldb.com/?ip.210.202.40.35) | NK210-202-40-35.vdsl.static.apol.com.tw | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-045f
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,59 +1,68 @@
# Buhtrap - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Buhtrap](https://vuldb.com/?actor.buhtrap). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Buhtrap](https://vuldb.com/?actor.buhtrap). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.buhtrap](https://vuldb.com/?actor.buhtrap)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.buhtrap](https://vuldb.com/?actor.buhtrap)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Buhtrap:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Buhtrap:
* RU
* US
* [RU](https://vuldb.com/?country.ru)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Buhtrap.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Buhtrap.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.63.159.32 | 5-63-159-32.cloudvps.regruhosting.ru | High
2 | 37.140.195.165 | console.teonet.cloud | High
3 | 37.143.12.190 | hosted-by.ihc.ru | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.63.159.32](https://vuldb.com/?ip.5.63.159.32) | 5-63-159-32.cloudvps.regruhosting.ru | - | High
2 | [37.140.195.165](https://vuldb.com/?ip.37.140.195.165) | console.teonet.cloud | - | High
3 | [37.143.12.190](https://vuldb.com/?ip.37.143.12.190) | hosted-by.ihc.ru | - | High
4 | ... | ... | ... | ...
There are 6 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Buhtrap_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Buhtrap. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `adclick.php` | Medium
2 | File | `adrotate.pm` | Medium
3 | File | `article.php` | Medium
4 | ... | ... | ...
1 | File | `/objects/getImageMP4.php` | High
2 | File | `/payu/icpcheckout/` | High
3 | File | `/uncpath/` | Medium
4 | File | `adclick.php` | Medium
5 | File | `admin.php` | Medium
6 | File | `adrotate.pm` | Medium
7 | File | `article.php` | Medium
8 | ... | ... | ...
There are 4 more IOA items available. Please use our online service to access the data.
There are 59 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=gib-buhtrap-report-GroupIB.pdf&y=2016
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,49 +1,49 @@
# Butterfly - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Butterfly](https://vuldb.com/?actor.butterfly). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Butterfly](https://vuldb.com/?actor.butterfly). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.butterfly](https://vuldb.com/?actor.butterfly)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.butterfly](https://vuldb.com/?actor.butterfly)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Butterfly:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Butterfly:
* NL
* US
* DE
* [NL](https://vuldb.com/?country.nl)
* [US](https://vuldb.com/?country.us)
* [DE](https://vuldb.com/?country.de)
* ...
There are 4 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Butterfly.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Butterfly.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 46.165.237.75 | - | High
2 | 46.183.217.132 | skalli.pereformed.com | High
3 | 178.162.197.9 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [46.165.237.75](https://vuldb.com/?ip.46.165.237.75) | - | - | High
2 | [46.183.217.132](https://vuldb.com/?ip.46.183.217.132) | skalli.pereformed.com | - | High
3 | [178.162.197.9](https://vuldb.com/?ip.178.162.197.9) | - | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Butterfly. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Butterfly_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1211 | 7PK Security Features | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Butterfly. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Butterfly. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -61,19 +61,20 @@ ID | Type | Indicator | Confidence
12 | File | `admin/orion.extfeedbackform_efbf_forms.php` | High
13 | File | `auth-gss2.c` | Medium
14 | File | `bin/jp2/convert.c` | High
15 | ... | ... | ...
15 | File | `books.php` | Medium
16 | ... | ... | ...
There are 123 more IOA items available. Please use our online service to access the data.
There are 126 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=butterfly-corporate-spies-out-for-financial-gain.pdf&y=2015
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,49 @@
# CCleaner Malware - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CCleaner Malware](https://vuldb.com/?actor.ccleaner_malware). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ccleaner_malware](https://vuldb.com/?actor.ccleaner_malware)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CCleaner Malware:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CCleaner Malware.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [216.126.225.148](https://vuldb.com/?ip.216.126.225.148) | - | - | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CCleaner Malware. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/wbg/core/_includes/authorization.inc.php` | High
2 | File | `inc/filebrowser/browser.php` | High
3 | File | `wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php` | High
4 | ... | ... | ...
There are 2 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://exchange.xforce.ibmcloud.com/collection/CCleaner-Malware-b76e23a6710956bd0782d55976e748ae
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,45 +1,45 @@
# CDRThief - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CDRThief](https://vuldb.com/?actor.cdrthief). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CDRThief](https://vuldb.com/?actor.cdrthief). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cdrthief](https://vuldb.com/?actor.cdrthief)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cdrthief](https://vuldb.com/?actor.cdrthief)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CDRThief:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CDRThief:
* CN
* [CN](https://vuldb.com/?country.cn)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CDRThief.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CDRThief.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 34.94.199.142 | 142.199.94.34.bc.googleusercontent.com | Medium
2 | 35.236.173.187 | 187.173.236.35.bc.googleusercontent.com | Medium
3 | 119.29.173.65 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [34.94.199.142](https://vuldb.com/?ip.34.94.199.142) | 142.199.94.34.bc.googleusercontent.com | - | Medium
2 | [35.236.173.187](https://vuldb.com/?ip.35.236.173.187) | 187.173.236.35.bc.googleusercontent.com | - | Medium
3 | [119.29.173.65](https://vuldb.com/?ip.119.29.173.65) | - | - | High
4 | ... | ... | ... | ...
There are 3 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CDRThief. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CDRThief_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/eset/malware-ioc/tree/master/cdrthief
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -54,41 +54,41 @@ ID | Type | Indicator | Confidence
2 | File | `/.vnc/sesman_${username}_passwd` | High
3 | File | `/addsrv` | Low
4 | File | `/Admin/Views/FileEditor/` | High
5 | File | `/article/add` | Medium
6 | File | `/cgi-bin/editBookmark` | High
7 | File | `/cgi-bin/uploadWeiXinPic` | High
8 | File | `/computer/(agent-name)/api` | High
9 | File | `/controller/pay.class.php` | High
10 | File | `/dev/block/mmcblk0rpmb` | High
11 | File | `/dev/kmem` | Medium
12 | File | `/dev/shm` | Medium
13 | File | `/dev/snd/seq` | Medium
14 | File | `/device/device=140/tab=wifi/view` | High
15 | File | `/dl/dl_print.php` | High
16 | File | `/getcfg.php` | Medium
17 | File | `/goform/addressNat` | High
18 | File | `/htdocs/admin/dict.php?id=3` | High
19 | File | `/include/menu_v.inc.php` | High
20 | File | `/includes/rrdtool.inc.php` | High
21 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
22 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
23 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
24 | File | `/login` | Low
25 | File | `/module/module_frame/index.php` | High
26 | File | `/notice-edit.php` | High
27 | File | `/nova/bin/sniffer` | High
28 | File | `/proc/pid/syscall` | High
29 | File | `/product_list.php` | High
30 | File | `/rest/api/2/user/picker` | High
31 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
32 | File | `/services/details.asp` | High
33 | File | `/src/core/controllers/cm.php` | High
34 | File | `/storage/app/media/evil.svg` | High
35 | File | `/transmission/web/` | High
36 | File | `/uapi/doc` | Medium
5 | File | `/api/user/{ID}` | High
6 | File | `/article/add` | Medium
7 | File | `/cgi-bin/editBookmark` | High
8 | File | `/cgi-bin/uploadWeiXinPic` | High
9 | File | `/computer/(agent-name)/api` | High
10 | File | `/controller/pay.class.php` | High
11 | File | `/dev/block/mmcblk0rpmb` | High
12 | File | `/dev/kmem` | Medium
13 | File | `/dev/shm` | Medium
14 | File | `/dev/snd/seq` | Medium
15 | File | `/device/device=140/tab=wifi/view` | High
16 | File | `/dl/dl_print.php` | High
17 | File | `/getcfg.php` | Medium
18 | File | `/goform/addressNat` | High
19 | File | `/htdocs/admin/dict.php?id=3` | High
20 | File | `/include/menu_v.inc.php` | High
21 | File | `/includes/rrdtool.inc.php` | High
22 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
23 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
24 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
25 | File | `/login` | Low
26 | File | `/module/module_frame/index.php` | High
27 | File | `/notice-edit.php` | High
28 | File | `/nova/bin/sniffer` | High
29 | File | `/proc/pid/syscall` | High
30 | File | `/product_list.php` | High
31 | File | `/rest/api/2/user/picker` | High
32 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
33 | File | `/services/details.asp` | High
34 | File | `/src/core/controllers/cm.php` | High
35 | File | `/storage/app/media/evil.svg` | High
36 | File | `/transmission/web/` | High
37 | ... | ... | ...
There are 316 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 318 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -121,9 +121,10 @@ ID | Type | Indicator | Confidence
33 | File | `add_vhost.php` | High
34 | File | `admin.php` | Medium
35 | File | `admin/conf_users_edit.php` | High
36 | ... | ... | ...
36 | File | `admin/default.asp` | High
37 | ... | ... | ...
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 315 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,55 +1,55 @@
# Cardinal RAT - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cardinal RAT](https://vuldb.com/?actor.cardinal_rat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cardinal RAT](https://vuldb.com/?actor.cardinal_rat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cardinal_rat](https://vuldb.com/?actor.cardinal_rat)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cardinal_rat](https://vuldb.com/?actor.cardinal_rat)
## Campaigns
The following campaigns are known and can be associated with Cardinal RAT:
The following _campaigns_ are known and can be associated with Cardinal RAT:
* Cardinal RAT
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cardinal RAT:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cardinal RAT:
* US
* CR
* AR
* [US](https://vuldb.com/?country.us)
* [CR](https://vuldb.com/?country.cr)
* [AR](https://vuldb.com/?country.ar)
* ...
There are 4 more country items available. Please use our online service to access the data.
There are 5 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cardinal RAT.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cardinal RAT.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 127.194.73.243 | - | High
2 | 127.194.87.192 | - | High
3 | 185.20.187.4 | 185.20.187.4.deltahost-ptr | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [127.194.73.243](https://vuldb.com/?ip.127.194.73.243) | - | Cardinal RAT | High
2 | [127.194.87.192](https://vuldb.com/?ip.127.194.87.192) | - | Cardinal RAT | High
3 | [185.20.187.4](https://vuldb.com/?ip.185.20.187.4) | 185.20.187.4.deltahost-ptr | Cardinal RAT | High
4 | ... | ... | ... | ...
There are 5 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cardinal RAT_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
There are 1 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cardinal RAT. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -65,17 +65,17 @@ ID | Type | Indicator | Confidence
10 | File | `admin/web_config.php` | High
11 | ... | ... | ...
There are 85 more IOA items available. Please use our online service to access the data.
There are 85 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/cardinal-rat-sins-again-targets-israeli-fin-tech-firms/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,76 +1,85 @@
# Careto - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Careto](https://vuldb.com/?actor.careto). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Careto](https://vuldb.com/?actor.careto). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.careto](https://vuldb.com/?actor.careto)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.careto](https://vuldb.com/?actor.careto)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Careto:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Careto:
* DE
* US
* AU
* [DE](https://vuldb.com/?country.de)
* [US](https://vuldb.com/?country.us)
* [ES](https://vuldb.com/?country.es)
* ...
There are 2 more country items available. Please use our online service to access the data.
There are 6 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Careto.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Careto.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 8.28.16.254 | - | High
2 | 12.0.0.38 | - | High
3 | 23.20.44.92 | ec2-23-20-44-92.compute-1.amazonaws.com | Medium
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [8.28.16.254](https://vuldb.com/?ip.8.28.16.254) | - | - | High
2 | [12.0.0.38](https://vuldb.com/?ip.12.0.0.38) | - | - | High
3 | [23.20.44.92](https://vuldb.com/?ip.23.20.44.92) | ec2-23-20-44-92.compute-1.amazonaws.com | - | Medium
4 | ... | ... | ... | ...
There are 13 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Careto. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Careto_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1211 | 7PK Security Features | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
There are 8 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Careto. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Careto. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/platform.cgi` | High
2 | File | `/Status/wan_button_action.asp` | High
3 | File | `/Users` | Low
4 | File | `Aavmker4.sys` | Medium
5 | File | `add_user.php` | Medium
6 | File | `admin/app/physical/physical.php` | High
7 | File | `admin/auto.def` | High
8 | File | `app/admin/custom-fields/filter.php` | High
9 | File | `auth-gss2.c` | Medium
10 | File | `backoffice/login.asp` | High
11 | File | `cisco/services/PhonecDirectory.php` | High
12 | ... | ... | ...
1 | File | `/api/update_setup` | High
2 | File | `/APP_Installation.asp` | High
3 | File | `/cgi-bin/live_api.cgi` | High
4 | File | `/IISADMPWD` | Medium
5 | File | `/php-fusion/infusions/shoutbox_panel/shoutbox_archive.php` | High
6 | File | `/platform.cgi` | High
7 | File | `/Status/wan_button_action.asp` | High
8 | File | `/tmp/.uci/network` | High
9 | File | `/uncpath/` | Medium
10 | File | `/Users` | Low
11 | File | `/usr/` | Low
12 | File | `Aavmker4.sys` | Medium
13 | File | `add_user.php` | Medium
14 | File | `admin/app/physical/physical.php` | High
15 | File | `admin/auto.def` | High
16 | File | `api/settings/values` | High
17 | File | `app/admin/custom-fields/filter.php` | High
18 | File | `appfeed.c` | Medium
19 | File | `ashmem.c` | Medium
20 | File | `auth-gss2.c` | Medium
21 | ... | ... | ...
There are 95 more IOA items available. Please use our online service to access the data.
There are 173 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=unveilingthemask_v1.0.pdf&y=2014
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,42 +1,42 @@
# Carrotbat - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Carrotbat](https://vuldb.com/?actor.carrotbat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Carrotbat](https://vuldb.com/?actor.carrotbat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.carrotbat](https://vuldb.com/?actor.carrotbat)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.carrotbat](https://vuldb.com/?actor.carrotbat)
## Campaigns
The following campaigns are known and can be associated with Carrotbat:
The following _campaigns_ are known and can be associated with Carrotbat:
* Fractured Block
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Carrotbat:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Carrotbat:
* CN
* US
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Carrotbat.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Carrotbat.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 61.14.210.72 | former-enews-out.businessinsider.org.uk | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [61.14.210.72](https://vuldb.com/?ip.61.14.210.72) | former-enews-out.businessinsider.org.uk | Fractured Block | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Carrotbat_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1068 | Execution with Unnecessary Privileges | High
2 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
2 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Carrotbat. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -45,17 +45,17 @@ ID | Type | Indicator | Confidence
3 | File | `auth-gss2.c` | Medium
4 | ... | ... | ...
There are 11 more IOA items available. Please use our online service to access the data.
There are 12 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=TheFracturedBlockCampaign_CARROTBATUsedtoDeliverMalwareTargetingSoutheastAsia-PaloAltoNetworksBlog.pdf&y=2018
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# CeidPageLock - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CeidPageLock](https://vuldb.com/?actor.ceidpagelock). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CeidPageLock](https://vuldb.com/?actor.ceidpagelock). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ceidpagelock](https://vuldb.com/?actor.ceidpagelock)
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CeidPageLock:
* CN
* [CN](https://vuldb.com/?country.cn)
## IOC - Indicator of Compromise
@ -16,12 +16,12 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 42.51.223.86 | - | - | High
2 | 118.193.211.11 | - | - | High
1 | [42.51.223.86](https://vuldb.com/?ip.42.51.223.86) | - | - | High
2 | [118.193.211.11](https://vuldb.com/?ip.118.193.211.11) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CeidPageLock. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CeidPageLock_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,33 +1,33 @@
# Center-1 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-1](https://vuldb.com/?actor.center-1). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-1](https://vuldb.com/?actor.center-1). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.center-1](https://vuldb.com/?actor.center-1)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.center-1](https://vuldb.com/?actor.center-1)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-1:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-1:
* IT
* [IT](https://vuldb.com/?country.it)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Center-1.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Center-1.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 80.211.37.240 | host240-37-211-80.serverdedicati.aruba.it | High
2 | 161.35.38.8 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [80.211.37.240](https://vuldb.com/?ip.80.211.37.240) | host240-37-211-80.serverdedicati.aruba.it | - | High
2 | [161.35.38.8](https://vuldb.com/?ip.161.35.38.8) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,46 +1,46 @@
# Center-2 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-2](https://vuldb.com/?actor.center-2). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Center-2](https://vuldb.com/?actor.center-2). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.center-2](https://vuldb.com/?actor.center-2)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.center-2](https://vuldb.com/?actor.center-2)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-2:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Center-2:
* FR
* IT
* US
* [FR](https://vuldb.com/?country.fr)
* [IT](https://vuldb.com/?country.it)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Center-2.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Center-2.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 80.211.35.111 | host111-35-211-80.serverdedicati.aruba.it | High
2 | 89.40.115.27 | host27-115-40-89.static.arubacloud.fr | High
3 | 134.122.68.221 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [80.211.35.111](https://vuldb.com/?ip.80.211.35.111) | host111-35-211-80.serverdedicati.aruba.it | - | High
2 | [89.40.115.27](https://vuldb.com/?ip.89.40.115.27) | host27-115-40-89.static.arubacloud.fr | - | High
3 | [134.122.68.221](https://vuldb.com/?ip.134.122.68.221) | - | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Center-2. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Center-2_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Center-2. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Center-2. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -54,17 +54,17 @@ ID | Type | Indicator | Confidence
8 | File | `action/addproject.php` | High
9 | ... | ... | ...
There are 68 more IOA items available. Please use our online service to access the data.
There are 69 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -44,7 +44,7 @@ There are 66 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Cerber_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cerber_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -85,7 +85,7 @@ ID | Type | Indicator | Confidence
22 | File | `content/unity-api.js` | High
23 | ... | ... | ...
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 191 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Cerberus - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cerberus](https://vuldb.com/?actor.cerberus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cerberus](https://vuldb.com/?actor.cerberus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cerberus](https://vuldb.com/?actor.cerberus)
@ -10,7 +10,7 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 91.210.169.114 | 490023-cc75354.tmweb.ru | - | High
1 | [91.210.169.114](https://vuldb.com/?ip.91.210.169.114) | 490023-cc75354.tmweb.ru | - | High
## References

View File

@ -1,60 +1,90 @@
# CetaRAT - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CetaRAT](https://vuldb.com/?actor.cetarat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CetaRAT](https://vuldb.com/?actor.cetarat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cetarat](https://vuldb.com/?actor.cetarat)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cetarat](https://vuldb.com/?actor.cetarat)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CetaRAT:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CetaRAT:
* US
* NL
* SA
* [NL](https://vuldb.com/?country.nl)
* [US](https://vuldb.com/?country.us)
* [SA](https://vuldb.com/?country.sa)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CetaRAT.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CetaRAT.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 109.236.85.152 | customer.worldstream.nl | High
2 | 161.97.142.96 | vmi745943.contaboserver.net | High
3 | 164.68.104.126 | vmd76303.contaboserver.net | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [109.236.85.152](https://vuldb.com/?ip.109.236.85.152) | customer.worldstream.nl | - | High
2 | [161.97.142.96](https://vuldb.com/?ip.161.97.142.96) | vmi745943.contaboserver.net | - | High
3 | [164.68.104.126](https://vuldb.com/?ip.164.68.104.126) | vmd76303.contaboserver.net | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CetaRAT_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CetaRAT. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `adclick.php` | Medium
2 | File | `data/gbconfiguration.dat` | High
3 | File | `exit.php` | Medium
4 | ... | ... | ...
1 | File | `.travis.yml` | Medium
2 | File | `/.env` | Low
3 | File | `/admin.php` | Medium
4 | File | `/admin/config.php?display=disa&view=form` | High
5 | File | `/category_view.php` | High
6 | File | `/dev/kmem` | Medium
7 | File | `/file?action=download&file` | High
8 | File | `/medical/inventories.php` | High
9 | File | `/monitoring` | Medium
10 | File | `/NAGErrors` | Medium
11 | File | `/plugins/servlet/audit/resource` | High
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
13 | File | `/proc/ioports` | High
14 | File | `/replication` | Medium
15 | File | `/RestAPI` | Medium
16 | File | `/tmp` | Low
17 | File | `/tmp/speedtest_urls.xml` | High
18 | File | `/uncpath/` | Medium
19 | File | `/var/log/nginx` | High
20 | File | `/wp-admin/admin.php` | High
21 | File | `adclick.php` | Medium
22 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
23 | File | `admin/index.php` | High
24 | File | `admin\model\catalog\download.php` | High
25 | File | `apcupsd.pid` | Medium
26 | File | `api/sms/send-sms` | High
27 | File | `api/v1/alarms` | High
28 | File | `application/controller/InstallerController.php` | High
29 | ... | ... | ...
There are 10 more IOA items available. Please use our online service to access the data.
There are 249 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -33,7 +33,7 @@ There are 26 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _ChaChi_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _ChaChi_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -61,26 +61,26 @@ ID | Type | Indicator | Confidence
9 | File | `/forum/away.php` | High
10 | File | `/get_getnetworkconf.cgi` | High
11 | File | `/horde/util/go.php` | High
12 | File | `/opensis/modules/users/Staff.php` | High
13 | File | `/plugins/servlet/gadgets/makeRequest` | High
14 | File | `/req_password_user.php` | High
15 | File | `/show_news.php` | High
16 | File | `/tmp` | Low
17 | File | `/uncpath/` | Medium
18 | File | `/Uploads` | Medium
19 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
20 | File | `/WEB-INF/web.xml` | High
21 | File | `/webconsole/APIController` | High
22 | File | `AccountStatus.jsp` | High
23 | File | `add.php` | Low
24 | File | `addentry.php` | Medium
25 | File | `admin.htm` | Medium
26 | File | `admin.php` | Medium
27 | File | `admin/article_category.php?rec=update` | High
28 | File | `admin/config/confmgr.php` | High
12 | File | `/nova/bin/detnet` | High
13 | File | `/opensis/modules/users/Staff.php` | High
14 | File | `/plugins/servlet/gadgets/makeRequest` | High
15 | File | `/req_password_user.php` | High
16 | File | `/show_news.php` | High
17 | File | `/tmp` | Low
18 | File | `/uncpath/` | Medium
19 | File | `/Uploads` | Medium
20 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
21 | File | `/WEB-INF/web.xml` | High
22 | File | `/webconsole/APIController` | High
23 | File | `AccountStatus.jsp` | High
24 | File | `add.php` | Low
25 | File | `addentry.php` | Medium
26 | File | `admin.htm` | Medium
27 | File | `admin.php` | Medium
28 | File | `admin/article_category.php?rec=update` | High
29 | ... | ... | ...
There are 244 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 245 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -23,7 +23,7 @@ ID | IP address | Hostname | Campaign | Confidence
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Chalubo. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chalubo_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -105,7 +105,7 @@ ID | Type | Indicator | Confidence
30 | File | `admin.php` | Medium
31 | ... | ... | ...
There are 262 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 261 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,27 +1,27 @@
# ChessMaster - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ChessMaster](https://vuldb.com/?actor.chessmaster). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ChessMaster](https://vuldb.com/?actor.chessmaster). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.chessmaster](https://vuldb.com/?actor.chessmaster)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.chessmaster](https://vuldb.com/?actor.chessmaster)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of ChessMaster.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ChessMaster.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 62.75.197.131 | static-ip-62-75-197-131.inaddr.ip-pool.com | High
2 | 89.18.27.159 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [62.75.197.131](https://vuldb.com/?ip.62.75.197.131) | static-ip-62-75-197-131.inaddr.ip-pool.com | - | High
2 | [89.18.27.159](https://vuldb.com/?ip.89.18.27.159) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=ChessMaster%E2%80%99sNewStrategy_EvolvingToolsandTactics-TrendLabsSecurityIntelligenceBlog.pdf&y=2017
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -27,7 +27,7 @@ There are 16 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Chimera. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chimera_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -45,39 +45,42 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `./clients/client` | High
2 | File | `/alumni/admin/ajax.php?action=save_settings` | High
2 | File | `//` | Low
3 | File | `/assets/ctx` | Medium
4 | File | `/cgi-bin/luci` | High
5 | File | `/cgi-bin/portal` | High
6 | File | `/cimom` | Low
7 | File | `/config/getuser` | High
8 | File | `/forum/away.php` | High
9 | File | `/gcp/roleset/*` | High
10 | File | `/horde/util/go.php` | High
11 | File | `/hostapd` | Medium
12 | File | `/IISADMPWD` | Medium
13 | File | `/iisadmpwd` | Medium
14 | File | `/include/chart_generator.php` | High
15 | File | `/MTFWU` | Low
16 | File | `/my_photo_gallery/image.php` | High
17 | File | `/public/login.htm` | High
18 | File | `/public/plugins/` | High
19 | File | `/rest/api/1.0/render` | High
20 | File | `/rest/api/latest/user/avatar/temporary` | High
21 | File | `/secure/admin/ConfigureBatching!default.jspa` | High
22 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
23 | File | `/sm/api/v1/firewall/zone/services` | High
24 | File | `/sys/attachment/uploaderServlet` | High
25 | File | `/uncpath/` | Medium
6 | File | `/config/getuser` | High
7 | File | `/forum/away.php` | High
8 | File | `/horde/util/go.php` | High
9 | File | `/hostapd` | Medium
10 | File | `/include/chart_generator.php` | High
11 | File | `/MTFWU` | Low
12 | File | `/my_photo_gallery/image.php` | High
13 | File | `/ptms/classes/Users.php` | High
14 | File | `/public/admin.php` | High
15 | File | `/public/login.htm` | High
16 | File | `/public/login.htm?errormsg=&loginurl=%22%3E%3Csvg%20onload=prompt%28/XSS/%29%3E` | High
17 | File | `/public/plugins/` | High
18 | File | `/rest/api/1.0/render` | High
19 | File | `/rest/api/latest/user/avatar/temporary` | High
20 | File | `/s/` | Low
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
22 | File | `/sm/api/v1/firewall/zone/services` | High
23 | File | `/sys/attachment/uploaderServlet` | High
24 | File | `/uncpath/` | Medium
25 | File | `/user-utils/users/md5.json` | High
26 | File | `/userRpm/popupSiteSurveyRpm.html` | High
27 | File | `/users/{id}` | Medium
28 | File | `/usr/bin/pkexec` | High
29 | File | `/wp-admin` | Medium
30 | File | `/wp-admin/admin-ajax.php` | High
31 | File | `/wp-json` | Medium
32 | ... | ... | ...
27 | File | `/usr/bin/pkexec` | High
28 | File | `/wp-admin/admin-ajax.php` | High
29 | File | `/wp-json` | Medium
30 | File | `102/tcp` | Low
31 | File | `accountrecoveryendpoint/recoverpassword.do` | High
32 | File | `admin.php` | Medium
33 | File | `admin.remository.php` | High
34 | File | `admin/conf_users_edit.php` | High
35 | ... | ... | ...
There are 268 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 299 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -20,7 +20,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [GB](https://vuldb.com/?country.gb)
* ...
There are 2 more country items available. Please use our online service to access the data.
There are 3 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise

View File

@ -31,7 +31,7 @@ There are 17 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Chthonic_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Chthonic_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Group:
* [DE](https://vuldb.com/?country.de)
* [IT](https://vuldb.com/?country.it)
* [SV](https://vuldb.com/?country.sv)
* [IT](https://vuldb.com/?country.it)
* [DE](https://vuldb.com/?country.de)
* ...
There are 6 more country items available. Please use our online service to access the data.
There are 7 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -35,12 +35,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -50,29 +50,32 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/account/login` | High
2 | File | `/admin.back` | Medium
3 | File | `/admin.html?do=user&act=add` | High
4 | File | `/admin/customers.php?page=1&cID` | High
5 | File | `/admin/link/link_ok.php` | High
3 | File | `/admin/customers.php?page=1&cID` | High
4 | File | `/admin/link/link_ok.php` | High
5 | File | `/admin/show.php` | High
6 | File | `/administrator/components/menu/` | High
7 | File | `/controller/CommentAdminController.java` | High
8 | File | `/event-management/index.php` | High
9 | File | `/goform/change_password_process` | High
10 | File | `/goform/edit_opt` | High
11 | File | `/goform/SetPptpServerCfg` | High
12 | File | `/hdf5/src/H5Fint.c` | High
13 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
14 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
15 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
16 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
17 | File | `/src/njs_object.c` | High
18 | File | `/template/unzip.do` | High
19 | File | `/wp-json/wc/v3/webhooks` | High
20 | File | `AccountManagerService.java` | High
21 | File | `account_sponsor_page.php` | High
22 | File | `act.php` | Low
23 | ... | ... | ...
8 | File | `/data/sqldata` | High
9 | File | `/feedback/post/` | High
10 | File | `/goform/change_password_process` | High
11 | File | `/goform/edit_opt` | High
12 | File | `/goform/SetPptpServerCfg` | High
13 | File | `/hdf5/src/H5Fint.c` | High
14 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
15 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
16 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
17 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
18 | File | `/setting/NTPSyncWithHost` | High
19 | File | `/src/njs_object.c` | High
20 | File | `/template/unzip.do` | High
21 | File | `/u8sl/WebHelp` | High
22 | File | `/wp-json/wc/v3/webhooks` | High
23 | File | `AccountManagerService.java` | High
24 | File | `account_sponsor_page.php` | High
25 | File | `act.php` | Low
26 | ... | ... | ...
There are 193 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
* [SV](https://vuldb.com/?country.sv)
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* [SV](https://vuldb.com/?country.sv)
* [GB](https://vuldb.com/?country.gb)
* ...
There are 11 more country items available. Please use our online service to access the data.
There are 10 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -23,10 +23,11 @@ ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.82.140.91](https://vuldb.com/?ip.23.82.140.91) | - | - | High
2 | [23.108.57.108](https://vuldb.com/?ip.23.108.57.108) | - | - | High
3 | [62.128.111.176](https://vuldb.com/?ip.62.128.111.176) | - | - | High
4 | ... | ... | ... | ...
3 | [45.134.26.174](https://vuldb.com/?ip.45.134.26.174) | - | - | High
4 | [45.144.29.185](https://vuldb.com/?ip.45.144.29.185) | master.pisyandriy.com | - | High
5 | ... | ... | ... | ...
There are 9 more IOC items available. Please use our online service to access the data.
There are 15 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -35,11 +36,11 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1222 | CWE-275 | Permission Issues | High
2 | T1068 | CWE-250, CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -47,78 +48,80 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.ssh/authorized_keys` | High
2 | File | `/?admin/user.html` | High
3 | File | `/admin/success_story.php` | High
4 | File | `/configuration/httpListenerEdit.jsf` | High
5 | File | `/etc/tomcat8/Catalina/attack` | High
6 | File | `/movie-portal-script/movie.php` | High
7 | File | `/notice-edit.php` | High
8 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
9 | File | `/tmp` | Low
10 | File | `/wp-content/plugins/updraftplus/admin.php` | High
11 | File | `4.2.0.CP08` | Medium
12 | File | `account.asp` | Medium
13 | File | `acerctrl.ocx` | Medium
14 | File | `activate.php` | Medium
15 | File | `add.php` | Low
16 | File | `addressbook/csv_import.php` | High
17 | File | `adm/krgourl.php` | High
18 | File | `admin.php` | Medium
19 | File | `admin/admin.php` | High
20 | File | `admin/adminaddeditdetails.php` | High
21 | File | `admin/ajaxsave.php` | High
22 | File | `admin/auth.php` | High
23 | File | `admin/config.php` | High
24 | File | `admin/images.php` | High
25 | File | `ADMIN/loginaction.php` | High
26 | File | `admin/member_details.php` | High
27 | File | `admin/preview.php` | High
28 | File | `ajax/addComment.php` | High
29 | File | `App_Data/sb.mdb` | High
30 | File | `archive_read_support_format_rar5.c` | High
31 | File | `article.php` | Medium
32 | File | `asp:.jpg` | Medium
33 | File | `auth-options.c` | High
34 | File | `auth2-gss.c` | Medium
35 | File | `aviso.php` | Medium
36 | File | `backup.php` | Medium
37 | File | `bios.php` | Medium
38 | File | `blanko.preview.php` | High
39 | File | `blocks.php` | Medium
40 | File | `breadcrumbs_create.php` | High
41 | File | `browse.php` | Medium
42 | File | `browse_ladies.php` | High
43 | File | `burl.c` | Low
44 | File | `cadena_ofertas_ext.php` | High
45 | File | `cal_popup.php` | High
46 | File | `category-delete.php` | High
47 | File | `category.php` | Medium
48 | File | `CFM File Handler` | High
49 | File | `cgi-bin/awstats.pl` | High
50 | File | `Change-password.php` | High
51 | File | `charts.php` | Medium
52 | File | `classified.php` | High
53 | File | `client.c` | Medium
54 | File | `cmd.php` | Low
55 | File | `comment.php` | Medium
56 | File | `comments.php` | Medium
57 | File | `config.php` | Medium
58 | File | `controller/fetchpwd.php` | High
59 | File | `core/stack/l2cap/l2cap_sm.c` | High
60 | File | `country_escorts.php` | High
61 | File | `cource.php` | Medium
62 | ... | ... | ...
1 | File | `/?admin/user.html` | High
2 | File | `/admin/success_story.php` | High
3 | File | `/configuration/httpListenerEdit.jsf` | High
4 | File | `/etc/tomcat8/Catalina/attack` | High
5 | File | `/movie-portal-script/movie.php` | High
6 | File | `/notice-edit.php` | High
7 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
8 | File | `/tmp` | Low
9 | File | `/wp-content/plugins/updraftplus/admin.php` | High
10 | File | `4.2.0.CP08` | Medium
11 | File | `account.asp` | Medium
12 | File | `acerctrl.ocx` | Medium
13 | File | `activate.php` | Medium
14 | File | `add.php` | Low
15 | File | `adm/krgourl.php` | High
16 | File | `admin.php` | Medium
17 | File | `admin/admin.php` | High
18 | File | `admin/adminaddeditdetails.php` | High
19 | File | `admin/ajaxsave.php` | High
20 | File | `admin/auth.php` | High
21 | File | `admin/images.php` | High
22 | File | `admin/import/class-import-settings.php` | High
23 | File | `ADMIN/loginaction.php` | High
24 | File | `admin/member_details.php` | High
25 | File | `admin/preview.php` | High
26 | File | `ajax/addComment.php` | High
27 | File | `and/or` | Low
28 | File | `arch/powerpc/kernel/entry_64.S` | High
29 | File | `archive_read_support_format_rar5.c` | High
30 | File | `article.php` | Medium
31 | File | `asp:.jpg` | Medium
32 | File | `auth2-gss.c` | Medium
33 | File | `backup.php` | Medium
34 | File | `bios.php` | Medium
35 | File | `blanko.preview.php` | High
36 | File | `block/bfq-iosched.c` | High
37 | File | `browse.php` | Medium
38 | File | `browse_ladies.php` | High
39 | File | `burl.c` | Low
40 | File | `cadena_ofertas_ext.php` | High
41 | File | `cal_popup.php` | High
42 | File | `category-delete.php` | High
43 | File | `category.php` | Medium
44 | File | `CFM File Handler` | High
45 | File | `cgi-bin/awstats.pl` | High
46 | File | `Change-password.php` | High
47 | File | `charts.php` | Medium
48 | File | `chat.php` | Medium
49 | File | `classified.php` | High
50 | File | `comments.php` | Medium
51 | File | `config.php` | Medium
52 | File | `core/stack/l2cap/l2cap_sm.c` | High
53 | File | `country_escorts.php` | High
54 | File | `cource.php` | Medium
55 | File | `Crypt32.dll` | Medium
56 | File | `dapur/index.php` | High
57 | File | `default.asp` | Medium
58 | ... | ... | ...
There are 547 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 509 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/
* https://isc.sans.edu/forums/diary/Attackers+Exploiting+WebLogic+Servers+via+CVE202014882+to+install+Cobalt+Strike/26752/
* https://isc.sans.edu/forums/diary/Example+of+Cobalt+Strike+from+Emotet+infection/28318/
* https://isc.sans.edu/forums/diary/Excel+spreadsheets+push+SystemBC+malware/27060/
* https://isc.sans.edu/forums/diary/June+2021+Forensic+Contest+Answers+and+Analysis/27582/
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike+and+VNC+activity/28448/
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike/27158/
* https://research.checkpoint.com/2019/cobalt-group-returns-to-kazakhstan/
* https://securelist.com/owowa-credential-stealer-and-remote-access/105219/
* https://twitter.com/malware_traffic/status/1400876426497253379
* https://twitter.com/malware_traffic/status/1415740795622248452
* https://twitter.com/Unit42_Intel/status/1392174941181812737

View File

@ -1,6 +1,6 @@
# CoinMiner - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinMiner](https://vuldb.com/?actor.coinminer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinMiner](https://vuldb.com/?actor.coinminer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.coinminer](https://vuldb.com/?actor.coinminer)
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinMiner:
* DE
* US
* ES
* [DE](https://vuldb.com/?country.de)
* [US](https://vuldb.com/?country.us)
* [NL](https://vuldb.com/?country.nl)
* ...
There are 3 more country items available. Please use our online service to access the data.
There are 4 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,24 +21,25 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 5.196.13.29 | 29.ip-5-196-13.eu | - | High
2 | 5.196.23.240 | 240.ip-5-196-23.eu | - | High
3 | 13.107.21.200 | - | - | High
4 | 18.210.126.40 | ec2-18-210-126-40.compute-1.amazonaws.com | - | Medium
5 | 23.21.48.44 | ec2-23-21-48-44.compute-1.amazonaws.com | - | Medium
6 | 23.21.76.253 | ec2-23-21-76-253.compute-1.amazonaws.com | - | Medium
7 | 23.21.126.66 | ec2-23-21-126-66.compute-1.amazonaws.com | - | Medium
8 | 23.21.140.41 | ec2-23-21-140-41.compute-1.amazonaws.com | - | Medium
9 | 23.21.252.4 | ec2-23-21-252-4.compute-1.amazonaws.com | - | Medium
10 | 49.12.80.38 | static.38.80.12.49.clients.your-server.de | - | High
11 | 49.12.80.40 | static.40.80.12.49.clients.your-server.de | - | High
12 | ... | ... | ... | ...
1 | [5.196.13.29](https://vuldb.com/?ip.5.196.13.29) | 29.ip-5-196-13.eu | - | High
2 | [5.196.23.240](https://vuldb.com/?ip.5.196.23.240) | 240.ip-5-196-23.eu | - | High
3 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
4 | [18.210.126.40](https://vuldb.com/?ip.18.210.126.40) | ec2-18-210-126-40.compute-1.amazonaws.com | - | Medium
5 | [23.21.48.44](https://vuldb.com/?ip.23.21.48.44) | ec2-23-21-48-44.compute-1.amazonaws.com | - | Medium
6 | [23.21.76.253](https://vuldb.com/?ip.23.21.76.253) | ec2-23-21-76-253.compute-1.amazonaws.com | - | Medium
7 | [23.21.126.66](https://vuldb.com/?ip.23.21.126.66) | ec2-23-21-126-66.compute-1.amazonaws.com | - | Medium
8 | [23.21.140.41](https://vuldb.com/?ip.23.21.140.41) | ec2-23-21-140-41.compute-1.amazonaws.com | - | Medium
9 | [23.21.252.4](https://vuldb.com/?ip.23.21.252.4) | ec2-23-21-252-4.compute-1.amazonaws.com | - | Medium
10 | [49.12.80.38](https://vuldb.com/?ip.49.12.80.38) | static.38.80.12.49.clients.your-server.de | - | High
11 | [49.12.80.40](https://vuldb.com/?ip.49.12.80.40) | static.40.80.12.49.clients.your-server.de | - | High
12 | [50.19.96.218](https://vuldb.com/?ip.50.19.96.218) | ec2-50-19-96-218.compute-1.amazonaws.com | - | Medium
13 | ... | ... | ... | ...
There are 46 more IOC items available. Please use our online service to access the data.
There are 48 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CoinMiner. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CoinMiner_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -47,7 +48,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -61,45 +62,46 @@ ID | Type | Indicator | Confidence
4 | File | `.tin` | Low
5 | File | `/aux` | Low
6 | File | `/coreframe/app/guestbook/myissue.php` | High
7 | File | `/data/nvram` | Medium
8 | File | `/icingaweb2/navigation/add` | High
9 | File | `/root/.keeper/` | High
10 | File | `/sbin/conf.d/SuSEconfig.javarunt` | High
11 | File | `/search-result/` | High
12 | File | `/usr/bin/sonia` | High
13 | File | `/var/log/nginx` | High
14 | File | `/var/spool/fax/outgoing/.last_run` | High
15 | File | `95.php` | Low
16 | File | `123flashchat.php` | High
17 | File | `action.php` | Medium
18 | File | `Active Browser Profile` | High
19 | File | `adb/adb_client.c` | High
20 | File | `addons/mod_media/body.php` | High
21 | File | `admin.php` | Medium
22 | File | `admin/profile_settings_net.html` | High
23 | File | `Administrator/add_pictures.php` | High
24 | File | `af_netlink.c` | Medium
25 | File | `aide.php3` | Medium
26 | File | `aim/icq` | Low
27 | File | `ajax.php` | Medium
28 | File | `akocomment.php` | High
29 | File | `album.php` | Medium
30 | File | `allmanageup.pl` | High
31 | File | `apache2/modsecurity.c` | High
32 | File | `ardeaCore/lib/core/ardeaInit.php` | High
33 | File | `arm/lithium-codegen-arm.cc` | High
34 | File | `attachment_send.php` | High
35 | File | `b2edit.showposts.php` | High
36 | File | `bar.phtml` | Medium
37 | File | `bios.php` | Medium
38 | File | `cadastro_usuario.php` | High
39 | File | `cartman.php` | Medium
40 | File | `cdf.c` | Low
41 | File | `cgi-bin/module/sysmanager/admin/SYSAdminUserDialog` | High
42 | File | `cgi/actions.py` | High
43 | ... | ... | ...
7 | File | `/icingaweb2/navigation/add` | High
8 | File | `/root/.keeper/` | High
9 | File | `/sbin/conf.d/SuSEconfig.javarunt` | High
10 | File | `/search-result/` | High
11 | File | `/usr/bin/sonia` | High
12 | File | `/var/log/nginx` | High
13 | File | `/var/spool/fax/outgoing/.last_run` | High
14 | File | `95.php` | Low
15 | File | `123flashchat.php` | High
16 | File | `action.php` | Medium
17 | File | `Active Browser Profile` | High
18 | File | `adb/adb_client.c` | High
19 | File | `addons/mod_media/body.php` | High
20 | File | `admin.php` | Medium
21 | File | `admin/profile_settings_net.html` | High
22 | File | `af.cgi/alienform.cgi` | High
23 | File | `af_netlink.c` | Medium
24 | File | `aide.php3` | Medium
25 | File | `aim/icq` | Low
26 | File | `ajax.php` | Medium
27 | File | `akocomment.php` | High
28 | File | `album.php` | Medium
29 | File | `allmanageup.pl` | High
30 | File | `apache2/modsecurity.c` | High
31 | File | `arm/lithium-codegen-arm.cc` | High
32 | File | `attachment_send.php` | High
33 | File | `b2edit.showposts.php` | High
34 | File | `bar.phtml` | Medium
35 | File | `bitmap/bdfread.c` | High
36 | File | `cadastro_usuario.php` | High
37 | File | `cartman.php` | Medium
38 | File | `cdf.c` | Low
39 | File | `cgi-bin/module/sysmanager/admin/SYSAdminUserDialog` | High
40 | File | `cgi/actions.py` | High
41 | File | `cgiproc` | Low
42 | File | `classifieds.cgi` | High
43 | File | `cmd.php` | Low
44 | ... | ... | ...
There are 376 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 385 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -113,6 +115,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.talosintelligence.com/2021/06/threat-roundup-0604-0611.html
* https://blog.talosintelligence.com/2021/06/threat-roundup-0611-0617.html
* https://blog.talosintelligence.com/2021/06/threat-roundup-0617-0624.html
* https://isc.sans.edu/forums/diary/CoinMiners+searching+for+hosts/24364/
## Literature

View File

@ -1,46 +1,46 @@
# CoinStomp - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinStomp](https://vuldb.com/?actor.coinstomp). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CoinStomp](https://vuldb.com/?actor.coinstomp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.coinstomp](https://vuldb.com/?actor.coinstomp)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.coinstomp](https://vuldb.com/?actor.coinstomp)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinStomp:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoinStomp:
* US
* RU
* CN
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CoinStomp.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CoinStomp.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 106.53.115.114 | - | High
2 | 109.234.36.173 | host-109-234-36-173.hosted-by-vdsina.ru | High
3 | 205.185.113.151 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [106.53.115.114](https://vuldb.com/?ip.106.53.115.114) | - | - | High
2 | [109.234.36.173](https://vuldb.com/?ip.109.234.36.173) | host-109-234-36-173.hosted-by-vdsina.ru | - | High
3 | [205.185.113.151](https://vuldb.com/?ip.205.185.113.151) | - | - | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CoinStomp_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CoinStomp. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -89,17 +89,17 @@ ID | Type | Indicator | Confidence
43 | File | `collection.class.php` | High
44 | ... | ... | ...
There are 385 more IOA items available. Please use our online service to access the data.
There are 384 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.cadosecurity.com/coinstomp-malware-family-targets-asian-cloud-service-providers/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,56 +1,57 @@
# Comnie - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Comnie](https://vuldb.com/?actor.comnie). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Comnie](https://vuldb.com/?actor.comnie). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.comnie](https://vuldb.com/?actor.comnie)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.comnie](https://vuldb.com/?actor.comnie)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Comnie:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Comnie:
* CN
* IT
* [CN](https://vuldb.com/?country.cn)
* [IT](https://vuldb.com/?country.it)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Comnie.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Comnie.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 113.196.70.11 | 113.196.70.11.ll.static.sparqnet.net | High
2 | 121.126.211.94 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [113.196.70.11](https://vuldb.com/?ip.113.196.70.11) | 113.196.70.11.ll.static.sparqnet.net | - | High
2 | [121.126.211.94](https://vuldb.com/?ip.121.126.211.94) | - | - | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Comnie. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Comnie_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307 | Improper Restriction of Excessive Authentication Attempts | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Comnie. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Comnie. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `wp-includes/functions.php` | High
2 | Argument | `filename` | Medium
3 | Argument | `hotjar script` | High
1 | File | `DAVServer.php` | High
2 | File | `dl/dl_download.php` | High
3 | File | `jtreelink/dialogs/links.php` | High
4 | ... | ... | ...
There are 1 more IOA items available. Please use our online service to access the data.
There are 6 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=ComnieContinuestoTargetOrganizationsinEastAsia_PaloAltoNetworks.pdf&y=2018
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -69,55 +69,55 @@ ID | Type | Indicator | Confidence
9 | File | `/filemanager/php/connector.php` | High
10 | File | `/get_getnetworkconf.cgi` | High
11 | File | `/HNAP1` | Low
12 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
14 | File | `/modx/manager/index.php` | High
15 | File | `/osm/REGISTER.cmd` | High
16 | File | `/product_list.php` | High
17 | File | `/replication` | Medium
18 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
19 | File | `/supervisor/procesa_carga.php` | High
20 | File | `/type.php` | Medium
21 | File | `/uncpath/` | Medium
22 | File | `/usr/bin/pkexec` | High
23 | File | `/zm/index.php` | High
24 | File | `4.2.0.CP09` | Medium
25 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
26 | File | `802dot1xclientcert.cgi` | High
27 | File | `add.exe` | Low
28 | File | `addentry.php` | Medium
29 | File | `admin-ajax.php` | High
30 | File | `admin.color.php` | High
31 | File | `admin.cropcanvas.php` | High
32 | File | `admin.joomlaradiov5.php` | High
33 | File | `admin.php` | Medium
34 | File | `admin.php?m=Food&a=addsave` | High
35 | File | `admin/conf_users_edit.php` | High
36 | File | `admin/index.php` | High
37 | File | `admin/user.php` | High
38 | File | `admin/write-post.php` | High
39 | File | `administrator/components/com_media/helpers/media.php` | High
40 | File | `admin_events.php` | High
41 | File | `ajax_new_account.php` | High
42 | File | `akocomments.php` | High
43 | File | `allopass-error.php` | High
44 | File | `announcement.php` | High
45 | File | `app.php` | Low
46 | File | `apply.cgi` | Medium
47 | File | `archiver\index.php` | High
48 | File | `artlinks.dispnew.php` | High
49 | File | `auth.inc.php` | Medium
50 | File | `authorization.do` | High
51 | File | `awstats.pl` | Medium
52 | File | `backoffice/login.asp` | High
53 | File | `bb_usage_stats.php` | High
54 | File | `binder.c` | Medium
55 | File | `books.php` | Medium
56 | File | `C:\Python27` | Medium
57 | File | `C:\Windows\System32\config\SAM` | High
12 | File | `/include/chart_generator.php` | High
13 | File | `/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events` | High
14 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
15 | File | `/modx/manager/index.php` | High
16 | File | `/osm/REGISTER.cmd` | High
17 | File | `/product_list.php` | High
18 | File | `/replication` | Medium
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
20 | File | `/supervisor/procesa_carga.php` | High
21 | File | `/type.php` | Medium
22 | File | `/uncpath/` | Medium
23 | File | `/usr/bin/pkexec` | High
24 | File | `/zm/index.php` | High
25 | File | `4.2.0.CP09` | Medium
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
27 | File | `802dot1xclientcert.cgi` | High
28 | File | `add.exe` | Low
29 | File | `addentry.php` | Medium
30 | File | `admin-ajax.php` | High
31 | File | `admin.color.php` | High
32 | File | `admin.cropcanvas.php` | High
33 | File | `admin.joomlaradiov5.php` | High
34 | File | `admin.php` | Medium
35 | File | `admin.php?m=Food&a=addsave` | High
36 | File | `admin/conf_users_edit.php` | High
37 | File | `admin/index.php` | High
38 | File | `admin/user.php` | High
39 | File | `admin/write-post.php` | High
40 | File | `administrator/components/com_media/helpers/media.php` | High
41 | File | `admin_events.php` | High
42 | File | `ajax_new_account.php` | High
43 | File | `akocomments.php` | High
44 | File | `allopass-error.php` | High
45 | File | `announcement.php` | High
46 | File | `app.php` | Low
47 | File | `apply.cgi` | Medium
48 | File | `archiver\index.php` | High
49 | File | `artlinks.dispnew.php` | High
50 | File | `auth.inc.php` | Medium
51 | File | `authorization.do` | High
52 | File | `awstats.pl` | Medium
53 | File | `backoffice/login.asp` | High
54 | File | `bb_usage_stats.php` | High
55 | File | `binder.c` | Medium
56 | File | `books.php` | Medium
57 | File | `C:\Python27` | Medium
58 | ... | ... | ...
There are 510 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 511 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [GB](https://vuldb.com/?country.gb)
* ...
There are 32 more country items available. Please use our online service to access the data.
There are 31 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -106,44 +106,44 @@ ID | Type | Indicator | Confidence
4 | File | `/admin/modules/system/custom_field.php` | High
5 | File | `/bin/boa` | Medium
6 | File | `/cgi-bin/wapopen` | High
7 | File | `/context/%2e/WEB-INF/web.xml` | High
8 | File | `/etc/sudoers` | Medium
9 | File | `/export` | Low
10 | File | `/iissamples` | Medium
11 | File | `/login` | Low
12 | File | `/modules/profile/index.php` | High
13 | File | `/monitoring` | Medium
14 | File | `/new` | Low
15 | File | `/proc/<pid>/status` | High
16 | File | `/public/plugins/` | High
17 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
18 | File | `/secure/QueryComponent!Default.jspa` | High
19 | File | `/show_news.php` | High
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
21 | File | `/tmp` | Low
22 | File | `/uncpath/` | Medium
23 | File | `/usr/bin/pkexec` | High
24 | File | `/usr/sbin/suexec` | High
25 | File | `/WEB-INF/web.xml` | High
26 | File | `/wp-admin/admin-ajax.php` | High
27 | File | `/wp-json/wc/v3/webhooks` | High
28 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
29 | File | `AccountManagerService.java` | High
30 | File | `actions/CompanyDetailsSave.php` | High
31 | File | `ActivityManagerService.java` | High
32 | File | `adclick.php` | Medium
33 | File | `admin.php` | Medium
34 | File | `admin.php?page=languages` | High
35 | File | `admin/add-glossary.php` | High
36 | File | `admin/admin.php` | High
37 | File | `admin/conf_users_edit.php` | High
38 | File | `admin/edit-comments.php` | High
39 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
40 | File | `admin\db\DoSql.php` | High
41 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
7 | File | `/cgi-mod/lookup.cgi` | High
8 | File | `/context/%2e/WEB-INF/web.xml` | High
9 | File | `/etc/sudoers` | Medium
10 | File | `/export` | Low
11 | File | `/iissamples` | Medium
12 | File | `/login` | Low
13 | File | `/modules/profile/index.php` | High
14 | File | `/monitoring` | Medium
15 | File | `/new` | Low
16 | File | `/proc/<pid>/status` | High
17 | File | `/public/plugins/` | High
18 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
19 | File | `/secure/QueryComponent!Default.jspa` | High
20 | File | `/show_news.php` | High
21 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
22 | File | `/tmp` | Low
23 | File | `/uncpath/` | Medium
24 | File | `/usr/bin/pkexec` | High
25 | File | `/usr/sbin/suexec` | High
26 | File | `/WEB-INF/web.xml` | High
27 | File | `/wp-admin/admin-ajax.php` | High
28 | File | `/wp-json/wc/v3/webhooks` | High
29 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
30 | File | `AccountManagerService.java` | High
31 | File | `actions/CompanyDetailsSave.php` | High
32 | File | `ActivityManagerService.java` | High
33 | File | `adclick.php` | Medium
34 | File | `admin.php` | Medium
35 | File | `admin.php?page=languages` | High
36 | File | `admin/add-glossary.php` | High
37 | File | `admin/admin.php` | High
38 | File | `admin/conf_users_edit.php` | High
39 | File | `admin/edit-comments.php` | High
40 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
41 | File | `admin\db\DoSql.php` | High
42 | ... | ... | ...
There are 360 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 363 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -9,11 +9,11 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CoolWebSearch:
* [US](https://vuldb.com/?country.us)
* [VN](https://vuldb.com/?country.vn)
* [CN](https://vuldb.com/?country.cn)
* [VN](https://vuldb.com/?country.vn)
* ...
There are 23 more country items available. Please use our online service to access the data.
There are 22 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -159,7 +159,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -180,28 +180,28 @@ ID | Type | Indicator | Confidence
11 | File | `/GponForm/fsetup_Form` | High
12 | File | `/log_download.cgi` | High
13 | File | `/modules/profile/index.php` | High
14 | File | `/monitoring` | Medium
15 | File | `/MTFWU` | Low
16 | File | `/new` | Low
17 | File | `/out.php` | Medium
18 | File | `/proc/<pid>/status` | High
19 | File | `/public/plugins/` | High
20 | File | `/s/` | Low
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
22 | File | `/secure/QueryComponent!Default.jspa` | High
23 | File | `/server-info` | Medium
24 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
25 | File | `/tmp` | Low
26 | File | `/uncpath/` | Medium
27 | File | `/updown/upload.cgi` | High
28 | File | `/usr/bin/pkexec` | High
29 | File | `/way4acs/enroll` | High
30 | File | `/WEB-INF/web.xml` | High
31 | File | `/wp-json/wc/v3/webhooks` | High
32 | File | `4.2.0.CP09` | Medium
14 | File | `/MTFWU` | Low
15 | File | `/new` | Low
16 | File | `/proc/<pid>/status` | High
17 | File | `/public/plugins/` | High
18 | File | `/s/` | Low
19 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
20 | File | `/secure/QueryComponent!Default.jspa` | High
21 | File | `/server-info` | Medium
22 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
23 | File | `/tmp` | Low
24 | File | `/uncpath/` | Medium
25 | File | `/updown/upload.cgi` | High
26 | File | `/usr/bin/pkexec` | High
27 | File | `/way4acs/enroll` | High
28 | File | `/WEB-INF/web.xml` | High
29 | File | `/wp-json/wc/v3/webhooks` | High
30 | File | `4.2.0.CP09` | Medium
31 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
32 | File | `AccountManagerService.java` | High
33 | ... | ... | ...
There are 277 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 281 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -14,12 +14,12 @@ The following _campaigns_ are known and can be associated with CopyKittens:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CopyKittens:
* [ES](https://vuldb.com/?country.es)
* [PL](https://vuldb.com/?country.pl)
* [FR](https://vuldb.com/?country.fr)
* [ES](https://vuldb.com/?country.es)
* [DE](https://vuldb.com/?country.de)
* ...
There are 5 more country items available. Please use our online service to access the data.
There are 6 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -72,24 +72,27 @@ ID | Type | Indicator | Confidence
3 | File | `/admin/configure.php` | High
4 | File | `/admin/index.php?lfj=member&action=editmember` | High
5 | File | `/admin/login.php` | High
6 | File | `/apilog.php` | Medium
7 | File | `/box_code_base.c` | High
8 | File | `/cloud_config/router_post/upgrade_info` | High
9 | File | `/forgetpassword.php` | High
10 | File | `/formAdvFirewall` | High
11 | File | `/function/booksave.php` | High
12 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
13 | File | `/moddable/xs/sources/xsDataView.c` | High
14 | File | `/ok_png.c` | Medium
15 | File | `abc2ps.c` | Medium
16 | File | `acknow.php` | Medium
17 | File | `adminlogin.php` | High
18 | File | `admin_home.php` | High
19 | File | `alfresco/s/admin/admin-nodebrowser` | High
20 | File | `allocator.cc` | Medium
21 | ... | ... | ...
6 | File | `/admin/modules/system/custom_field.php` | High
7 | File | `/alerts/alertLightbox.php` | High
8 | File | `/api /v3/auth` | High
9 | File | `/apilog.php` | Medium
10 | File | `/box_code_base.c` | High
11 | File | `/cloud_config/router_post/upgrade_info` | High
12 | File | `/forgetpassword.php` | High
13 | File | `/formAdvFirewall` | High
14 | File | `/function/booksave.php` | High
15 | File | `/goform/SetInternetLanInfo` | High
16 | File | `/goform/setPicListItem` | High
17 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
18 | File | `/moddable/xs/sources/xsDataView.c` | High
19 | File | `/ok_png.c` | Medium
20 | File | `/one_church/userregister.php` | High
21 | File | `acknow.php` | Medium
22 | File | `adminlogin.php` | High
23 | File | `admin_home.php` | High
24 | ... | ... | ...
There are 178 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 200 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,39 +1,39 @@
# Corkow - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Corkow](https://vuldb.com/?actor.corkow). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Corkow](https://vuldb.com/?actor.corkow). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.corkow](https://vuldb.com/?actor.corkow)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.corkow](https://vuldb.com/?actor.corkow)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Corkow.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Corkow.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 1.17.6.4 | - | High
2 | 3.8.9.6 | ec2-3-8-9-6.eu-west-2.compute.amazonaws.com | Medium
3 | 4.1.0.1 | - | High
4 | 4.3.1.2 | - | High
5 | 4.3.9.1 | - | High
6 | 4.3.9.5 | - | High
7 | 4.3.9.7 | - | High
8 | 4.3.9.8 | - | High
9 | 4.4.7.1 | lag-32-1065-99.ear3.Chicago2.Level3.net | High
10 | 4.4.7.2 | ANDERSEN-CO.ear3.Chicago2.Level3.net | High
11 | 4.4.7.7 | - | High
12 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [1.17.6.4](https://vuldb.com/?ip.1.17.6.4) | - | - | High
2 | [3.8.9.6](https://vuldb.com/?ip.3.8.9.6) | ec2-3-8-9-6.eu-west-2.compute.amazonaws.com | - | Medium
3 | [4.1.0.1](https://vuldb.com/?ip.4.1.0.1) | - | - | High
4 | [4.3.1.2](https://vuldb.com/?ip.4.3.1.2) | - | - | High
5 | [4.3.9.1](https://vuldb.com/?ip.4.3.9.1) | - | - | High
6 | [4.3.9.5](https://vuldb.com/?ip.4.3.9.5) | - | - | High
7 | [4.3.9.7](https://vuldb.com/?ip.4.3.9.7) | - | - | High
8 | [4.3.9.8](https://vuldb.com/?ip.4.3.9.8) | - | - | High
9 | [4.4.7.1](https://vuldb.com/?ip.4.4.7.1) | lag-32-1065-99.ear3.Chicago2.Level3.net | - | High
10 | [4.4.7.2](https://vuldb.com/?ip.4.4.7.2) | ANDERSEN-CO.ear3.Chicago2.Level3.net | - | High
11 | [4.4.7.7](https://vuldb.com/?ip.4.4.7.7) | - | - | High
12 | ... | ... | ... | ...
There are 45 more IOC items available. Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/#apt_report_19
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# CosmicDuke - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CosmicDuke](https://vuldb.com/?actor.cosmicduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CosmicDuke](https://vuldb.com/?actor.cosmicduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cosmicduke](https://vuldb.com/?actor.cosmicduke)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CosmicDuke:
* LU
* DE
* SE
* [LU](https://vuldb.com/?country.lu)
* [DE](https://vuldb.com/?country.de)
* [SE](https://vuldb.com/?country.se)
* ...
There are 1 more country items available. Please use our online service to access the data.
@ -21,16 +21,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 46.246.120.178 | - | - | High
2 | 91.224.141.235 | - | - | High
3 | 94.242.199.88 | ip-static-94-242-199-88.server.lu | - | High
1 | [46.246.120.178](https://vuldb.com/?ip.46.246.120.178) | - | - | High
2 | [91.224.141.235](https://vuldb.com/?ip.91.224.141.235) | - | - | High
3 | [94.242.199.88](https://vuldb.com/?ip.94.242.199.88) | ip-static-94-242-199-88.server.lu | - | High
4 | ... | ... | ... | ...
There are 7 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by CosmicDuke. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CosmicDuke_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,45 +1,45 @@
# CozyDuke - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CozyDuke](https://vuldb.com/?actor.cozyduke). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CozyDuke](https://vuldb.com/?actor.cozyduke). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cozyduke](https://vuldb.com/?actor.cozyduke)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cozyduke](https://vuldb.com/?actor.cozyduke)
## Campaigns
The following campaigns are known and can be associated with CozyDuke:
The following _campaigns_ are known and can be associated with CozyDuke:
* MiniDionis
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CozyDuke:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CozyDuke:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CozyDuke.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CozyDuke.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 64.244.34.200 | - | High
2 | 121.193.130.170 | - | High
3 | 122.228.193.115 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [64.244.34.200](https://vuldb.com/?ip.64.244.34.200) | - | MiniDionis | High
2 | [121.193.130.170](https://vuldb.com/?ip.121.193.130.170) | - | - | High
3 | [122.228.193.115](https://vuldb.com/?ip.122.228.193.115) | - | MiniDionis | High
4 | ... | ... | ... | ...
There are 5 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CozyDuke_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CozyDuke. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -48,14 +48,14 @@ ID | Type | Indicator | Confidence
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=MiniDionis_CozyCar_Seaduke.pdf&y=2015
* https://www.threatminer.org/report.php?q=TheCozyDukeAPT-Securelist.pdf&y=2015
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,30 @@
# Crafty Panda - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crafty Panda](https://vuldb.com/?actor.crafty_panda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crafty_panda](https://vuldb.com/?actor.crafty_panda)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crafty Panda.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [69.172.75.223](https://vuldb.com/?ip.69.172.75.223) | 69-172-75-223.static.imsbiz.com | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.nttsecurity.com/docs/librariesprovider3/default-document-library/craftypanda-analysis-report
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,36 +1,36 @@
# Crashoverride - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crashoverride](https://vuldb.com/?actor.crashoverride). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crashoverride](https://vuldb.com/?actor.crashoverride). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crashoverride](https://vuldb.com/?actor.crashoverride)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crashoverride](https://vuldb.com/?actor.crashoverride)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crashoverride:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crashoverride:
* RU
* [RU](https://vuldb.com/?country.ru)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crashoverride.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crashoverride.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.39.218.152 | - | High
2 | 93.115.27.57 | - | High
3 | 195.16.88.6 | server10005.defaulthost.net | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.39.218.152](https://vuldb.com/?ip.5.39.218.152) | - | - | High
2 | [93.115.27.57](https://vuldb.com/?ip.93.115.27.57) | - | - | High
3 | [195.16.88.6](https://vuldb.com/?ip.195.16.88.6) | server10005.defaulthost.net | - | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Crashoverride_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-80 | Cross Site Scripting | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crashoverride. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -39,17 +39,17 @@ ID | Type | Indicator | Confidence
3 | File | `web/upload/UploadHandler.php` | High
4 | ... | ... | ...
There are 2 more IOA items available. Please use our online service to access the data.
There are 2 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=CrashOverride-01-DragosSecurity.pdf&y=2017
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,51 +1,51 @@
# Crimeware - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crimeware](https://vuldb.com/?actor.crimeware). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crimeware](https://vuldb.com/?actor.crimeware). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crimeware](https://vuldb.com/?actor.crimeware)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crimeware](https://vuldb.com/?actor.crimeware)
## Campaigns
The following campaigns are known and can be associated with Crimeware:
The following _campaigns_ are known and can be associated with Crimeware:
* CTB-Locker
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crimeware:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crimeware:
* FR
* US
* IT
* [FR](https://vuldb.com/?country.fr)
* [US](https://vuldb.com/?country.us)
* [IT](https://vuldb.com/?country.it)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crimeware.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crimeware.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.134.122.150 | hpt01.web.l1.armada.it | High
2 | 64.71.33.177 | - | High
3 | 188.93.8.7 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.134.122.150](https://vuldb.com/?ip.5.134.122.150) | hpt01.web.l1.armada.it | CTB-Locker | High
2 | [64.71.33.177](https://vuldb.com/?ip.64.71.33.177) | - | CTB-Locker | High
3 | [188.93.8.7](https://vuldb.com/?ip.188.93.8.7) | - | CTB-Locker | High
4 | ... | ... | ... | ...
There are 4 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Crimeware. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Crimeware_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1068 | Execution with Unnecessary Privileges | High
2 | T1587.003 | Improper Certificate Validation | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
2 | T1587.003 | CWE-295 | Improper Certificate Validation | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crimeware. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crimeware. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -54,17 +54,17 @@ ID | Type | Indicator | Confidence
3 | File | `fs/inode.c` | Medium
4 | ... | ... | ...
There are 4 more IOA items available. Please use our online service to access the data.
There are 4 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/newest-ctb-locker-campaign-bypasses-legacy-security-products/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,31 +1,37 @@
# Cryptbot - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cryptbot](https://vuldb.com/?actor.cryptbot). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cryptbot](https://vuldb.com/?actor.cryptbot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cryptbot](https://vuldb.com/?actor.cryptbot)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cryptbot](https://vuldb.com/?actor.cryptbot)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cryptbot:
* [DE](https://vuldb.com/?country.de)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cryptbot.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cryptbot.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 8.248.153.254 | - | High
2 | 8.248.163.254 | - | High
3 | 8.248.167.254 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [8.248.153.254](https://vuldb.com/?ip.8.248.153.254) | - | - | High
2 | [8.248.163.254](https://vuldb.com/?ip.8.248.163.254) | - | - | High
3 | [8.248.167.254](https://vuldb.com/?ip.8.248.167.254) | - | - | High
4 | ... | ... | ... | ...
There are 13 more IOC items available. Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/10/threat-roundup-1008-1015.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,55 +1,55 @@
# CryptoPHP - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CryptoPHP](https://vuldb.com/?actor.cryptophp). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [CryptoPHP](https://vuldb.com/?actor.cryptophp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cryptophp](https://vuldb.com/?actor.cryptophp)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cryptophp](https://vuldb.com/?actor.cryptophp)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CryptoPHP:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with CryptoPHP:
* US
* PL
* RU
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of CryptoPHP.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of CryptoPHP.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 50.17.195.149 | ec2-50-17-195-149.compute-1.amazonaws.com | Medium
2 | 78.138.118.195 | - | High
3 | 78.138.118.196 | - | High
4 | 78.138.118.197 | - | High
5 | 78.138.118.198 | - | High
6 | 78.138.118.199 | - | High
7 | 78.138.118.200 | - | High
8 | 78.138.118.201 | - | High
9 | 78.138.118.202 | - | High
10 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [50.17.195.149](https://vuldb.com/?ip.50.17.195.149) | ec2-50-17-195-149.compute-1.amazonaws.com | - | Medium
2 | [78.138.118.195](https://vuldb.com/?ip.78.138.118.195) | - | - | High
3 | [78.138.118.196](https://vuldb.com/?ip.78.138.118.196) | - | - | High
4 | [78.138.118.197](https://vuldb.com/?ip.78.138.118.197) | - | - | High
5 | [78.138.118.198](https://vuldb.com/?ip.78.138.118.198) | - | - | High
6 | [78.138.118.199](https://vuldb.com/?ip.78.138.118.199) | - | - | High
7 | [78.138.118.200](https://vuldb.com/?ip.78.138.118.200) | - | - | High
8 | [78.138.118.201](https://vuldb.com/?ip.78.138.118.201) | - | - | High
9 | [78.138.118.202](https://vuldb.com/?ip.78.138.118.202) | - | - | High
10 | ... | ... | ... | ...
There are 35 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _CryptoPHP_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 1 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by CryptoPHP. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -58,17 +58,17 @@ ID | Type | Indicator | Confidence
3 | File | `FormDisplay.php` | High
4 | ... | ... | ...
There are 12 more IOA items available. Please use our online service to access the data.
There are 12 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/fox-it/cryptophp/blob/master/ips.txt
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,70 @@
# Curious Gorge - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Curious Gorge](https://vuldb.com/?actor.curious_gorge). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.curious_gorge](https://vuldb.com/?actor.curious_gorge)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Curious Gorge:
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Curious Gorge.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.188.108.119](https://vuldb.com/?ip.5.188.108.119) | t200514-1.com | - | High
2 | [45.154.12.167](https://vuldb.com/?ip.45.154.12.167) | - | - | High
3 | [91.216.190.58](https://vuldb.com/?ip.91.216.190.58) | - | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Curious Gorge_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Curious Gorge. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/cgi-bin/supervisor/PwdGrp.cgi` | High
2 | File | `/Items/*/RemoteImages/Download` | High
3 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
4 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
5 | File | `adclick.php` | Medium
6 | ... | ... | ...
There are 36 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

Some files were not shown because too many files have changed in this diff Show More