DDG v3014 Analysis

IOB - Indicator of Behavior (46)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en28
fr8
pl4
ru4
sv2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us24
fr22

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Oracle MySQL Server6
xvid4
Soplanning2
ImageMagick2
Oracle Database 11g2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1xvid Windows Media Player decoder_create memory corruption10.09.5$0-$5k$0-$5kNot DefinedOfficial Fix0.019270.00CVE-2009-0894
2TFM MMPlayer memory corruption10.010.0$0-$5k$0-$5kHighUnavailable0.508450.00CVE-2009-2566
3Rockwell Rslogix 5000 Design And Configuration Software Password Protection credentials management8.47.3$0-$5k$0-$5kUnprovenOfficial Fix0.000610.00CVE-2014-0755
4Rockwell Automation RSLogix Micro Starter Lite RSS Project File memory corruption8.68.6$0-$5k$0-$5kNot DefinedNot Defined0.008280.00CVE-2016-5814
5Cisco CallManager SIP Request Stored information disclosure5.34.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.011600.00CVE-2006-4032
6Intel Express 500 IP Packet denial of service5.35.3$5k-$25k$0-$5kNot DefinedNot Defined0.012740.00CVE-2000-0764
7Oracle MySQL Server DDL denial of service4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000590.00CVE-2022-21444
8TAC Vista Web Interface isalogin.dll path traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003660.00CVE-2005-3040
9ImageMagick png.c RelinquishMagickMemory Free use after free5.45.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000920.00CVE-2017-12671
10Foscam R2C IP Camera Running System FW/Application FW Firmware Patch race condition8.18.1$0-$5k$0-$5kNot DefinedNot Defined0.002000.02CVE-2022-28743
11transmission Torrent File variant.c use after free7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.010630.00CVE-2018-10756
12Ligeo Download server-side request forgery3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.016730.04CVE-2021-46107
13Oracle Database 11g Enterprise Manager access control7.37.3$5k-$25k$0-$5kHighNot Defined0.973680.04CVE-2012-1675
14Post-scriptum RedLine cross site scripting4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001170.00CVE-2011-3863
15Oracle MySQL Server DDL denial of service4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000770.00CVE-2020-14867
16Oracle MySQL Server DDL denial of service4.94.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.001270.00CVE-2019-2644
17D-Link DAP-1360U Ping privileges management7.17.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.005500.00CVE-2020-26582
18Oracle MySQL Server DDL access control4.94.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.001340.02CVE-2019-2495
19xvid Windows Media Player memory corruption10.09.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.040200.00CVE-2009-0893
20Oracle MySQL Server DDL access control4.94.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.001340.00CVE-2019-2494

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (5)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1FileaspxpredictiveLow
2Filecoders/png.cpredictiveMedium
3Filexxxxxxxxxxxxxxx/xxxxxxx.xpredictiveHigh
4Libraryxxxxxxxx.xxxpredictiveMedium
5ArgumentxxxxxxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!