Dfni Analysis

IOB - Indicator of Behavior (31)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en26
ru4
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us18
ua10
ru4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

IBM Security AppScan Enterprise2
D-Link DCS-930L2
D-Link DCS-932L2
Oracle Primavera Contract Management2
GitLab2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1IBM Security AppScan Enterprise Enterprise Source Database cryptographic issues9.88.5$5k-$25k$0-$5kUnprovenOfficial Fix0.000820.00CVE-2013-3989
2raspap-webgui activate_ovpncfg.php command injection8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.880690.00CVE-2022-39986
3PHP Everywhere Plugin Shortcode Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001080.00CVE-2022-24663
4Add Link to Facebook Plugin profile.php cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000570.03CVE-2018-5214
5openmosix libmosix.c this memory corruption4.04.0$0-$5k$0-$5kNot DefinedNot Defined0.000420.00CVE-2008-1865
6User Post Gallery Plugin authorization8.58.4$0-$5k$0-$5kNot DefinedNot Defined0.051920.00CVE-2022-4060
7eSST Monitoring unrestricted upload7.57.4$0-$5k$0-$5kNot DefinedNot Defined0.001160.00CVE-2023-41631
8Boa Web Server HEAD Method improper authorization6.36.2$0-$5k$0-$5kNot DefinedNot Defined0.001120.09CVE-2022-45956
9GitLab Privilege Escalation5.15.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001180.00CVE-2021-22263
10ThinkPHP unrestricted upload7.17.1$0-$5k$0-$5kNot DefinedNot Defined0.000580.06CVE-2022-44289
11SuiteCRM Accounts/Contacts/Opportunities/Leads csv injection6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.000630.00CVE-2020-15301
12cocoapods-downloader argument injection6.86.7$0-$5k$0-$5kNot DefinedOfficial Fix0.001310.00CVE-2022-21223
13PHP Everywhere Plugin Metabox Privilege Escalation8.88.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001080.03CVE-2022-24664
14APC UPS Network Management Card 2 AOS Remote Monitoring Credentials insufficiently protected credentials7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.002220.00CVE-2018-7820
15APC Switched Rack Pdu improper authentication7.56.6$0-$5k$0-$5kUnprovenUnavailable0.013550.00CVE-2007-6226
16Dropbear SSH dropbearconvert input validation8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009560.04CVE-2016-7407
17Dropbear SSH input validation8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.029110.04CVE-2016-7406
18Supermicro H8dgu-f Intelligent Platform Management Interface PrivilegeCallBack input validation9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.016150.00CVE-2013-3609
19Drupal permission assignment5.85.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000880.00CVE-2017-6928
20D-Link DCS-930L/DCS-932L Authentication information disclosure5.34.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000000.05

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
15.149.248.134Dfni04/08/2022verifiedHigh
2XXX.XXX.XXX.XXxxxxxx.xx.xxx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxx04/08/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (13)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ajax/openvpn/activate_ovpncfg.phppredictiveHigh
2FileFlexCell.ocxpredictiveMedium
3Filexxxxxxxx.xpredictiveMedium
4Filexxxxx-xxxxxxx.xxxpredictiveHigh
5Filexx-xxxxx/xxxxxxx.xxxpredictiveHigh
6Libraryxxx/xxxxxxx-xxxxxxxxx-x.x.x.xxxpredictiveHigh
7Argumentxxxxx_xxxxxxxx_xxpredictiveHigh
8Argumentxxx_xxpredictiveLow
9ArgumentxxpredictiveLow
10ArgumentxxxxpredictiveLow
11Argumentxxx_xxpredictiveLow
12ArgumentxxxxpredictiveLow
13Argumentxxxxxxxx/xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!