Bisonal Analysis

IOB - Indicator of Behavior (16)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en14
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Bitrix Site Manager4
WordPress2
CodeIgniter2
SSH Agent Plugin2
Autoptimize Plugin2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Bitrix Site Manager redirect.php link following5.34.7$0-$5k$0-$5kUnprovenUnavailable0.001130.04CVE-2008-2052
2FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.002030.08CVE-2008-5928
3Idera Travis CI Activation .travis.yml information disclosure2.62.6$0-$5k$0-$5kNot DefinedNot Defined0.001560.02CVE-2021-41077
4Autoptimize Plugin Import code injection5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.010160.00CVE-2021-24376
5Bitrix Upload from Local Disk Feature restore.php unrestricted upload6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.000490.05CVE-2022-29268
6Bitrix Site Manager Vote Module Remote Code Execution7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.006680.08CVE-2022-27228
7SSH Agent Plugin authorization3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000540.00CVE-2022-20620
8CodeIgniter Sendmail Email.php injection8.58.1$0-$5k$0-$5kNot DefinedOfficial Fix0.049200.04CVE-2016-10131
9Atlassian Bitbucket Data Center path traversal8.18.0$0-$5k$0-$5kNot DefinedOfficial Fix0.004410.00CVE-2019-3397
10furlongm openvpn-monitor Management Interface Socket command injection3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.001220.04CVE-2021-31605
11VMware vCenter Server Analytics Service unrestricted upload8.68.5$5k-$25k$0-$5kHighOfficial Fix0.973920.04CVE-2021-22005
12WordPress HTML Element general-template.php HTML injection4.44.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000940.03CVE-2017-17093
13Linux Kernel UDP Packet udp.c security check8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.048370.03CVE-2016-10229
14Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaround0.020160.00CVE-2007-1192
15Tiki TikiWiki tiki-editpage.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.011940.03CVE-2004-1386
16INFINICART browse_group.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.002620.00CVE-2006-5957

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
161.90.202.19761-90-202-197.static.asianet.co.thBisonal03/07/2020verifiedHigh
261.90.202.19861-90-202-198.static.asianet.co.thBisonal03/07/2020verifiedHigh
3XX.XXX.XXX.XXxxxxxxxx.xxxXxxxxxx03/07/2020verifiedHigh
4XXX.XXX.XXX.XXXxxxxxx12/22/2020verifiedHigh
5XXX.XXX.XXX.XXXXxxxxxx03/07/2020verifiedHigh
6XXX.XXX.XXX.XXXXxxxxxx07/30/2022verifiedHigh
7XXX.XX.XX.XXXXxxxxxx12/22/2020verifiedHigh

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (16)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.travis.ymlpredictiveMedium
2Filebrowse_group.asppredictiveHigh
3Filedata/gbconfiguration.datpredictiveHigh
4Filexxxxx.xxxpredictiveMedium
5Filexxxxxxxx.xxxpredictiveMedium
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxx-xxxxxxxx.xxxpredictiveHigh
8Filexxx.xpredictiveLow
9Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveHigh
10Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
11Argumentxxxxx->xxxxpredictiveMedium
12ArgumentxxxxpredictiveLow
13ArgumentxxpredictiveLow
14ArgumentxxxxpredictiveLow
15ArgumentxxxxxpredictiveLow
16Network PortxxxpredictiveLow

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!