cyber_threat_intelligence/actors/United Arab Emirates Unknown
2022-11-26 12:43:44 +01:00
..
README.md Update 2022-11-26 12:43:44 +01:00

United Arab Emirates Unknown - Cyber Threat Intelligence

These indicators were reported, collected, and generated during the VulDB CTI analysis of the actor known as United Arab Emirates Unknown. The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique predictive model uses big data to forecast activities and their characteristics.

Live data and more analysis capabilities are available at https://vuldb.com/?actor.united_arab_emirates_unknown

Countries

These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with United Arab Emirates Unknown:

There are 18 more country items available. Please use our online service to access the data.

IOC - Indicator of Compromise

These indicators of compromise (IOC) indicate associated network resources which are known to be part of research and attack activities of United Arab Emirates Unknown.

ID IP address Hostname Campaign Confidence
1 2.16.158.22 a2-16-158-22.deploy.static.akamaitechnologies.com - High
2 2.16.158.28 a2-16-158-28.deploy.static.akamaitechnologies.com - High
3 2.16.158.36 a2-16-158-36.deploy.static.akamaitechnologies.com - High
4 2.16.158.44 a2-16-158-44.deploy.static.akamaitechnologies.com - High
5 2.16.158.52 a2-16-158-52.deploy.static.akamaitechnologies.com - High
6 2.16.158.60 a2-16-158-60.deploy.static.akamaitechnologies.com - High
7 2.16.158.68 a2-16-158-68.deploy.static.akamaitechnologies.com - High
8 2.16.158.76 a2-16-158-76.deploy.static.akamaitechnologies.com - High
9 2.16.158.84 a2-16-158-84.deploy.static.akamaitechnologies.com - High
10 2.16.158.92 a2-16-158-92.deploy.static.akamaitechnologies.com - High
11 2.20.249.69 a2-20-249-69.deploy.static.akamaitechnologies.com - High
12 2.20.249.70 a2-20-249-70.deploy.static.akamaitechnologies.com - High
13 2.20.249.72 a2-20-249-72.deploy.static.akamaitechnologies.com - High
14 2.20.249.77 a2-20-249-77.deploy.static.akamaitechnologies.com - High
15 2.20.249.78 a2-20-249-78.deploy.static.akamaitechnologies.com - High
16 2.20.249.80 a2-20-249-80.deploy.static.akamaitechnologies.com - High
17 2.20.249.85 a2-20-249-85.deploy.static.akamaitechnologies.com - High
18 2.20.249.86 a2-20-249-86.deploy.static.akamaitechnologies.com - High
19 2.20.249.88 a2-20-249-88.deploy.static.akamaitechnologies.com - High
20 2.20.249.93 a2-20-249-93.deploy.static.akamaitechnologies.com - High
21 2.20.249.94 a2-20-249-94.deploy.static.akamaitechnologies.com - High
22 2.20.249.96 a2-20-249-96.deploy.static.akamaitechnologies.com - High
23 2.20.249.101 a2-20-249-101.deploy.static.akamaitechnologies.com - High
24 2.20.249.102 a2-20-249-102.deploy.static.akamaitechnologies.com - High
25 2.20.249.104 a2-20-249-104.deploy.static.akamaitechnologies.com - High
26 2.20.249.109 a2-20-249-109.deploy.static.akamaitechnologies.com - High
27 2.20.249.110 a2-20-249-110.deploy.static.akamaitechnologies.com - High
28 2.20.249.112 a2-20-249-112.deploy.static.akamaitechnologies.com - High
29 2.20.249.117 a2-20-249-117.deploy.static.akamaitechnologies.com - High
30 2.20.249.118 a2-20-249-118.deploy.static.akamaitechnologies.com - High
31 2.20.249.120 a2-20-249-120.deploy.static.akamaitechnologies.com - High
32 2.20.249.125 a2-20-249-125.deploy.static.akamaitechnologies.com - High
33 2.20.249.126 a2-20-249-126.deploy.static.akamaitechnologies.com - High
34 2.20.249.128 a2-20-249-128.deploy.static.akamaitechnologies.com - High
35 2.20.249.134 a2-20-249-134.deploy.static.akamaitechnologies.com - High
36 2.20.249.136 a2-20-249-136.deploy.static.akamaitechnologies.com - High
37 2.20.249.141 a2-20-249-141.deploy.static.akamaitechnologies.com - High
38 2.20.249.142 a2-20-249-142.deploy.static.akamaitechnologies.com - High
39 2.20.249.144 a2-20-249-144.deploy.static.akamaitechnologies.com - High
40 2.20.249.150 a2-20-249-150.deploy.static.akamaitechnologies.com - High
41 2.20.249.152 a2-20-249-152.deploy.static.akamaitechnologies.com - High
42 2.20.249.157 a2-20-249-157.deploy.static.akamaitechnologies.com - High
43 2.20.249.159 a2-20-249-159.deploy.static.akamaitechnologies.com - High
44 2.20.249.160 a2-20-249-160.deploy.static.akamaitechnologies.com - High
45 2.20.249.165 a2-20-249-165.deploy.static.akamaitechnologies.com - High
46 2.20.249.166 a2-20-249-166.deploy.static.akamaitechnologies.com - High
47 2.21.231.4 a2-21-231-4.deploy.static.akamaitechnologies.com - High
48 2.21.231.12 a2-21-231-12.deploy.static.akamaitechnologies.com - High
49 2.21.231.20 a2-21-231-20.deploy.static.akamaitechnologies.com - High
50 2.21.231.28 a2-21-231-28.deploy.static.akamaitechnologies.com - High
51 2.21.231.36 a2-21-231-36.deploy.static.akamaitechnologies.com - High
52 2.21.231.44 a2-21-231-44.deploy.static.akamaitechnologies.com - High
53 2.21.231.52 a2-21-231-52.deploy.static.akamaitechnologies.com - High
54 2.21.231.60 a2-21-231-60.deploy.static.akamaitechnologies.com - High
55 2.21.231.84 a2-21-231-84.deploy.static.akamaitechnologies.com - High
56 2.21.231.92 a2-21-231-92.deploy.static.akamaitechnologies.com - High
57 2.21.231.94 a2-21-231-94.deploy.static.akamaitechnologies.com - High
58 2.21.231.100 a2-21-231-100.deploy.static.akamaitechnologies.com - High
59 2.21.231.108 a2-21-231-108.deploy.static.akamaitechnologies.com - High
60 2.21.231.110 a2-21-231-110.deploy.static.akamaitechnologies.com - High
61 2.21.231.116 a2-21-231-116.deploy.static.akamaitechnologies.com - High
62 2.21.231.124 a2-21-231-124.deploy.static.akamaitechnologies.com - High
63 2.21.231.132 a2-21-231-132.deploy.static.akamaitechnologies.com - High
64 2.48.0.0 - - High
65 5.1.44.0 - - High
66 5.30.0.0 - - High
67 5.32.0.0 - - High
68 5.38.0.0 - - High
69 5.53.96.0 - - High
70 5.62.61.200 r-200-61-62-5.consumer-pool.prcdn.net - High
71 5.62.63.188 r-188-63-62-5.consumer-pool.prcdn.net - High
72 5.83.112.0 - - High
73 5.107.0.0 - - High
74 5.132.154.0 - - High
75 5.152.248.0 - - High
76 5.175.142.0 - - High
77 5.175.150.128 - - High
78 5.182.124.0 - - High
79 5.192.0.0 - - High
80 8.5.251.0 - - High
81 13.104.151.64 - - High
82 13.104.151.128 - - High
83 13.104.159.128 - - High
84 14.0.61.0 - - High
85 17.67.212.0 - - High
86 17.69.224.0 - - High
87 17.73.8.0 - - High
88 17.73.16.0 - - High
89 20.37.64.0 uaec03.rnm.core.windows.net - High
90 20.38.124.0 - - High
91 20.38.136.0 uaen05.rnm.core.windows.net - High
92 20.45.64.0 - - High
93 20.46.32.0 - - High
94 20.46.144.0 - - High
95 20.46.192.0 - - High
96 20.150.6.0 - - High
97 20.190.187.0 - - High
98 20.190.188.0 - - High
99 23.92.222.48 - - High
100 23.103.134.64 - - High
101 23.103.134.224 - - High
102 23.248.184.0 - - High
103 23.251.116.0 - - High
104 31.6.9.0 - - High
105 31.6.10.0 - - High
106 31.6.17.0 - - High
107 31.6.18.0 - - High
108 31.6.20.0 - - High
109 31.6.30.0 - - High
110 31.6.41.0 - - High
111 31.6.42.0 - - High
112 31.6.44.0 - - High
113 ... ... ... ...

There are 449 more IOC items available. Please use our online service to access the data.

TTP - Tactics, Techniques, Procedures

Tactics, techniques, and procedures (TTP) summarize the suspected MITRE ATT&CK techniques used by United Arab Emirates Unknown. This data is unique as it uses our predictive model for actor profiling.

ID Technique Weakness Description Confidence
1 T1006 CWE-21, CWE-22, CWE-23 Pathname Traversal High
2 T1040 CWE-294, CWE-319 Authentication Bypass by Capture-replay High
3 T1055 CWE-74 Injection High
4 T1059 CWE-94 Cross Site Scripting High
5 ... ... ... ...

There are 17 more TTP items available. Please use our online service to access the data.

IOA - Indicator of Attack

These indicators of attack (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by United Arab Emirates Unknown. This data is unique as it uses our predictive model for actor profiling.

ID Type Indicator Confidence
1 File .htaccess Medium
2 File /Admin/add-student.php High
3 File /admin/conferences/list/ High
4 File /admin/edit_admin_details.php?id=admin High
5 File /admin/generalsettings.php High
6 File /Admin/login.php High
7 File /admin/payment.php High
8 File /admin/reports.php High
9 File /admin/showbad.php High
10 File /admin_page/all-files-update-ajax.php High
11 File /apilog.php Medium
12 File /bsms/?page=products High
13 File /cgi-bin/kerbynet High
14 File /cgi-bin/login.cgi High
15 File /cgi-bin/system_mgr.cgi High
16 File /cgi-bin/wlogin.cgi High
17 File /connectors/index.php High
18 File /dms/admin/reports/daily_collection_report.php High
19 File /forum/away.php High
20 File /include/chart_generator.php High
21 File /index.php Medium
22 File /info.cgi Medium
23 File /Items/*/RemoteImages/Download High
24 File /items/view_item.php High
25 File /lists/admin/ High
26 File /MagickCore/image.c High
27 File /manager/index.php High
28 File /medical/inventories.php High
29 File /mgmt/tm/util/bash High
30 File /modules/profile/index.php High
31 File /modules/projects/vw_files.php High
32 File /modules/public/calendar.php High
33 File /newsDia.php Medium
34 File /out.php Medium
35 File /plugin Low
36 File /public/launchNewWindow.jsp High
37 File /sacco_shield/manage_user.php High
38 File /spip.php Medium
39 File /sqlitemanager/main.php?dbsel=-1%20or%2072%20=%2072 High
40 File /staff/bookdetails.php High
41 File /TeleoptiWFM/Administration/GetOneTenant High
42 File /user/update_booking.php High
43 File /var/www/core/controller/index.php High
44 File /WEB-INF/web.xml High
45 File /Wedding-Management-PHP/admin/photos_add.php High
46 File /Wedding-Management/package_detail.php High
47 File /wordpress/wp-admin/options-general.php High
48 File /wp-admin/admin-ajax.php High
49 File /wp-content/plugins/woocommerce/templates/emails/plain/ High
50 File a2billing/customer/iridium_threed.php High
51 File AdClass.php Medium
52 File adclick.php Medium
53 File addtocart.asp High
54 ... ... ...

There are 469 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

References

The following list contains external sources which discuss the actor and the associated activities:

Literature

The following articles explain our unique predictive cyber threat intelligence:

License

(c) 1997-2022 by vuldb.com. All data on this page is shared under the license CC BY-NC-SA 4.0. Questions? Check the FAQ, read the documentation or contact us!