Hadglider Analysis

IOB - Indicator of Behavior (216)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en204
ru12

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn18
us14
ru8
es4
gb2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Chrome8
4Site CMS6
Apple macOS6
Google Android4
Perl4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Dahua DHI-HCVR7216A-S3 SmartPSS Auto Login Hash access control6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.003310.04CVE-2017-6342
2Cyr to Lat Plugin sql injection6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.000500.03CVE-2022-4290
3HPE Onboard Administrator Reflected cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000500.03CVE-2020-7132
4xwikisas macro-pdfviewer PDF Viewer Macro information disclosure6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2024-30263
5Moises Heberle WooCommerce Bookings Calendar Plugin cross site scripting5.04.9$0-$5k$0-$5kNot DefinedNot Defined0.000430.00CVE-2024-31117
6Foxit PDF Reader AcroForm use after free6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000460.03CVE-2024-30354
7Tenda AC10 SetStaticRouteCfg fromSetRouteStatic stack-based overflow8.88.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.15CVE-2024-2581
8MediaTek MT8798 Lk memory corruption6.76.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.02CVE-2024-20022
9Kofax Power PDF PNG File Parser out-of-bounds4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.000650.03CVE-2024-27336
10Linux Kernel ASPM pci_set_power_state_locked deadlock4.84.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.03CVE-2024-26605
11Elementor Plugin deserialization5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.03CVE-2024-24934
12IBM Security Access Manager Container DSC Server resource consumption6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.02CVE-2023-31006
13WP Recipe Maker Plugin cross site scripting5.15.1$0-$5k$0-$5kNot DefinedNot Defined0.000450.02CVE-2024-0382
14Dahua IPC/SD/NVR/XVR Packet unknown vulnerability4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000630.03CVE-2022-30564
15PrestaShop blockwishlist sql injection7.77.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007410.00CVE-2022-31101
16ThemePunch OHG Slider Revolution Plugin unrestricted upload7.27.1$0-$5k$0-$5kNot DefinedNot Defined0.000500.05CVE-2023-47784
17OpenZeppelin openzeppelin-contracts Subcall control flow5.75.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000480.06CVE-2023-49798
18Brocade Fabric OS risky encryption6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000910.00CVE-2021-27795
19WPFactory Products, Order & Customers Export for WooCommerce Plugin cross site scripting5.85.8$0-$5k$0-$5kNot DefinedNot Defined0.000460.00CVE-2023-47547
20Bitrix24 MIME Type unrestricted upload8.38.3$0-$5k$0-$5kNot DefinedNot Defined0.000870.00CVE-2023-1720

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.9.148.123Hadglider03/31/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (20)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (78)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ajax.php?action=read_msgpredictiveHigh
2File/debug/pprofpredictiveMedium
3File/desktop_app/file.ajax.php?action=uploadfilepredictiveHigh
4File/envpredictiveLow
5File/goform/SetNetControlListpredictiveHigh
6File/goform/SetStaticRouteCfgpredictiveHigh
7File/src/chatbotapp/chatWindow.javapredictiveHigh
8Fileadmin/categories_industry.phppredictiveHigh
9Fileadmin/class-woo-popup-admin.phppredictiveHigh
10Filexxxxx/xxxxxxx/xxxxxxxxxxxxpredictiveHigh
11Filexxxxxxxxxxxx/xxxxx/xxxx/predictiveHigh
12Filexxxxx.xxxpredictiveMedium
13Filexxx_xx_xxx_xxx.xxxpredictiveHigh
14Filexxx.xpredictiveLow
15FilexxxpredictiveLow
16Filexxx/xxxxxxxx/xxxx/xxxxxxxx.xxpredictiveHigh
17Filexxxxxxx/xxx/xxx-xx.xpredictiveHigh
18Filexxx_xxxx.xpredictiveMedium
19Filexxx/xxxxx.xxxxxpredictiveHigh
20Filexxxx/xxxxxxxx/xxx&xx=xxxxxxxpredictiveHigh
21Filexxxxxxxxxxxxxxxxxxxxxxxxx.xxpredictiveHigh
22Filexxxxxx.xxxpredictiveMedium
23Filexxxxxxx/xxxxx.xxx.xxxpredictiveHigh
24Filexx_xxxxx.xpredictiveMedium
25Filexxxxx_xxxxx.xpredictiveHigh
26Filexxxxxx/xxx/xxxxxxxx.xpredictiveHigh
27Filexxxx.xxxpredictiveMedium
28Filexxxxx.xxxpredictiveMedium
29Filexxxxxxxx.xxxpredictiveMedium
30Filexxxxxxx/xxxxxx/xxxxxx/xxxxxxxxx.xxx#xxxpredictiveHigh
31Filexxxxxxxxxxx-xxxx.xxpredictiveHigh
32Filexxxxxxxxx/xxxxx.xxxxxpredictiveHigh
33Filexxxxx/xxxxx.xxxxxpredictiveHigh
34Filexxxxxxx.xpredictiveMedium
35Filexxxxxxxxxxxxx.xxxpredictiveHigh
36Filexxxxxx-xxxxxx.xxxpredictiveHigh
37Filexxxxxxxx.xxx/xxxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
38Filexxx.xpredictiveLow
39FilexxxxxxxxxxxxxxxxpredictiveHigh
40Filexxx-xxxxxxx-xxx.xxpredictiveHigh
41Filexxxxxxx.xpredictiveMedium
42Filexxx.xxxpredictiveLow
43Filexx-xxxxx-xxxxxx.xxxpredictiveHigh
44File~/xxxxxxxx/xxxxx-xxx-xxxxxx-xxxxxxxxxxxx.xxxpredictiveHigh
45Libraryxx.xxxxxxxxxx.xxxxxxxxxxxxxxx.xxxpredictiveHigh
46Libraryxxx/xxxxxxxxx/xxxxxxxx.xxxxx.xxxpredictiveHigh
47Libraryxxxxxxx.xxxpredictiveMedium
48Libraryxxxxx.xxxpredictiveMedium
49Libraryxxxxxxxxxxxxx.xxx)predictiveHigh
50ArgumentxxxxxxpredictiveLow
51ArgumentxxxpredictiveLow
52Argumentxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxpredictiveHigh
53ArgumentxxxxxxpredictiveLow
54Argumentx:\xxxxxxx\xpredictiveMedium
55Argumentxxxxx_xxxxpredictiveMedium
56Argumentxxxxx_xxpredictiveMedium
57ArgumentxxxxxxxxpredictiveMedium
58ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
59Argumentxxx_xxxpredictiveLow
60ArgumentxxxxpredictiveLow
61ArgumentxxxxpredictiveLow
62Argumentxxxx_xxxxxpredictiveMedium
63Argumentxxxxxx_xxxpredictiveMedium
64ArgumentxxxxpredictiveLow
65ArgumentxxpredictiveLow
66ArgumentxxxxxxxpredictiveLow
67ArgumentxxxxpredictiveLow
68ArgumentxxxxpredictiveLow
69ArgumentxxxxxxxpredictiveLow
70Argumentx_xxxxpredictiveLow
71Argumentxxxxxx/xxxxxx_xxxxxxpredictiveHigh
72ArgumentxxxpredictiveLow
73ArgumentxxxxxpredictiveLow
74ArgumentxxxxxxxxxxxpredictiveMedium
75ArgumentxxpredictiveLow
76ArgumentxxxxxxpredictiveLow
77Argumentx-xxxxxxxxx-xxxxpredictiveHigh
78Input Value//xxx//xxxxxxx.xxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!