Prometei Analysis

IOB - Indicator of Behavior (191)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en188
sv2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us190
id2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Asterisk PBX4
Grandstream Gxv Device4
Solare Solar-Log2
YaBB2
Openads2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000002.01
2FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.002030.15CVE-2008-5928
3vBulletin redirector.php6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001060.03CVE-2018-6200
4Vunet VU Web Visitor Analyst redir.asp sql injection7.37.1$0-$5k$0-$5kHighWorkaround0.001190.03CVE-2010-2338
5Bitrix Site Manager redirect.php link following5.34.7$0-$5k$0-$5kUnprovenUnavailable0.001130.04CVE-2008-2052
6Openads adclick.php Remote Code Execution7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.018710.18CVE-2007-2046
7MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.013020.62CVE-2007-0354
8GetSimpleCMS index.php redirect6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001230.00CVE-2019-9915
9OpenX adclick.php redirect5.34.7$0-$5k$0-$5kUnprovenUnavailable0.004400.15CVE-2014-2230
10phpPgAds adclick.php unknown vulnerability5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.003170.22CVE-2005-3791
11DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.48CVE-2010-0966
12Sangoma FreePBX/PBXact restapps Privilege Escalation6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.007560.00CVE-2020-10666
13Issabel PBX Create New Rate cross site scripting3.53.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000540.03CVE-2021-34190
14Issabel PBX cross site scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000580.00CVE-2021-46558
15DZCP deV!L`z Clanportal browser.php information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.027330.22CVE-2007-1167
16My Link Trader out.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.05
17WordPress AdServe adclick.php sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000730.07CVE-2008-0507
18PHPWind goto.php redirect6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.003480.11CVE-2015-4134
19Asterisk PBX SIP Invite res_pjsip_session denial of service4.84.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001140.00CVE-2020-28327
20Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009362.42CVE-2020-15906

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (53)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/inquiries/view_details.phppredictiveHigh
2File/admin/maintenance/view_designation.phppredictiveHigh
3File/cgi-bin/touchlist_sync.cgipredictiveHigh
4File/forum/away.phppredictiveHigh
5File/LogoStore/search.phppredictiveHigh
6File/mhds/clinic/view_details.phppredictiveHigh
7File/newsDia.phppredictiveMedium
8File/out.phppredictiveMedium
9File/xxxxxxxx-xxxxxxx.xxxpredictiveHigh
10File/xxxxxxx/xxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
11Filexxxxxxx.xxxpredictiveMedium
12Filexxxxx/xxxxxx.xxxpredictiveHigh
13Filexxxxx/xxxx_xxxxx_xxxx.xxxpredictiveHigh
14Filexxxxx/xxxxx.xxxpredictiveHigh
15Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictiveHigh
16Filexxxxx.xxxpredictiveMedium
17Filexxxx.xxxpredictiveMedium
18Filexxxx.xxxpredictiveMedium
19Filexxx/xxxxxx.xxxpredictiveHigh
20Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
21Filexxxxx.xxx?xxxx=xxxxxxx_xxxxxpredictiveHigh
22Filexxxxxxx/xxx.xxxpredictiveHigh
23Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
24Filexxxx.xxxpredictiveMedium
25Filexxxxx.xxxpredictiveMedium
26Filexxxxx.xxxpredictiveMedium
27Filexxxxxxxx.xxxpredictiveMedium
28Filexxxxxxxxxx.xxxpredictiveHigh
29Filexxxx-xxxxxxxxxx.xxxpredictiveHigh
30Filexxxx-xxxxx.xxxpredictiveHigh
31Filexxxxx/xxxxxxxx_xxxxxx/xxxxxx_xxxxxxxx_xxxxx.xxxpredictiveHigh
32Filexxxxxxx.xxxpredictiveMedium
33Filexxxx.xxpredictiveLow
34ArgumentxxxxxxxxpredictiveMedium
35ArgumentxxxxxxxxpredictiveMedium
36ArgumentxxxxxpredictiveLow
37ArgumentxxxpredictiveLow
38ArgumentxxxxxxxxxxxpredictiveMedium
39ArgumentxxxxpredictiveLow
40ArgumentxxxxpredictiveLow
41ArgumentxxxxpredictiveLow
42ArgumentxxpredictiveLow
43ArgumentxxxxxxxxxpredictiveMedium
44ArgumentxxpredictiveLow
45Argumentxxxx/xxxxxxpredictiveMedium
46ArgumentxxxxxxxxpredictiveMedium
47ArgumentxxxxxpredictiveLow
48ArgumentxxxxxxxxpredictiveMedium
49ArgumentxxxpredictiveLow
50ArgumentxxxpredictiveLow
51Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
52Input Valuexxxx' xxxxx xxx xxxxxx xxxxxx(xxxxxx('xxxxx','xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'),'xxxxx'),xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx,xxxx-- xxxx&xxxxxx=predictiveHigh
53Pattern|xx|predictiveLow

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!