UNC4736 Analysis

IOB - Indicator of Behavior (20)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en20

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us20

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

LG Mobile Devices6
Drupal4
IBM Security Guardium Insights2
Martin Diphoorn Com Ds-syndicate2
WordPress2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1WordPress class-wp-customize-widgets.php privileges management7.36.4$5k-$25k$0-$5kUnprovenOfficial Fix0.071580.03CVE-2014-5203
2LG Mobile Devices input validation6.46.4$5k-$25k$5k-$25kNot DefinedNot Defined0.000820.00CVE-2020-25063
3LG Mobile Devices VZW Network privileges management8.58.5$5k-$25k$5k-$25kNot DefinedNot Defined0.001060.00CVE-2020-25061
4LG Mobile Devices Automated Testing unknown vulnerability7.57.5$25k-$100k$5k-$25kNot DefinedNot Defined0.000660.00CVE-2020-25064
5LG Mobile Devices Privileges privileges management6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000420.00CVE-2020-25060
6IBM Security Guardium Insights risky encryption6.46.4$5k-$25k$0-$5kNot DefinedNot Defined0.001070.00CVE-2020-4169
7Projects World Travel Management System Pic Upload updatesubcategory.php unrestricted upload8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.009400.00CVE-2020-24203
8WordPress pluggable.php cross-site request forgery5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.001540.00CVE-2014-5204
9Boa Terminal input validation5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.023950.05CVE-2009-4496
10tibbr Community/tibbr Enterprise SAML access control7.27.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000650.00CVE-2017-5530
11VMware Zimbra Collaboration Suite Ajx%20TemplateMsg.js.zgz path traversal5.35.3$5k-$25k$0-$5kHighNot Defined0.973370.05CVE-2013-7091
12TP-Link TL-WR840N Administration Console cross-site request forgery6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001660.00CVE-2014-9510
13AnyMacro AnyMacro Mail System path traversal5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.002480.02CVE-2011-2468
14Com Yvcomment index.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.001070.00CVE-2008-2692
15WPML Comment feed sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.012620.05CVE-2015-2314
16WordPress ZipArchive/PclZip path traversal7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004740.03CVE-2017-14719
17Drupal System Module Reflected 7pk security6.46.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002630.03CVE-2016-3168
18Drupal File Module access control8.17.7$0-$5k$0-$5kNot DefinedOfficial Fix0.001800.00CVE-2016-3162
19Martin Diphoorn Com Ds-syndicate index2.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.002120.00CVE-2008-4623

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
189.45.67.160UNC473612/27/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22Path TraversalpredictiveHigh
2T1068CAPEC-122CWE-264, CWE-269, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
3TXXXXCAPEC-CWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
4TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh
5TXXXXCAPEC-20CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh
6TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (11)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filecomments/feedpredictiveHigh
2Fileindex.phppredictiveMedium
3Filexxxxxx.xxxpredictiveMedium
4Filexxx/xxxxxxx/xxxxxx/xxxx/xxxxx/xxxxxxx/xxxxxx/xxxxx/xxx%xxxxxxxxxxxxx.xx.xxxpredictiveHigh
5Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
6Filexx-xxxxxxxx/xxxxx-xx-xxxxxxxxx-xxxxxxx.xxxpredictiveHigh
7Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
8ArgumentxxxxxxxxxpredictiveMedium
9Argumentxxxx_xxpredictiveLow
10ArgumentxxxxpredictiveLow
11ArgumentxxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!