event_id
int64
1
1.69k
event_title
stringlengths
8
178
event_timestamp
stringlengths
25
25
event_date
stringlengths
10
10
event_tags
stringlengths
9
5.32k
category
stringclasses
16 values
type
stringlengths
2
23
value
stringlengths
2
22.2k
attribute_tags
stringlengths
3
354
1,673
The Golden Tax Department and the Emergence of GoldenSpy Malware
2023-12-15 12:52:45+00:00
2020-06-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Compromise Software Supply Chain - T1195.002"
Network activity
port
33666
null
1,674
MAR-10478915-1.v1 Citrix Bleed
2023-12-06 07:58:07+00:00
2023-12-06
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload installation
yara
'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_01 rule_content=rule CISA_10478915_01 : trojan installs_other_components { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "installs-other-components" malware_Type = "trojan" tool_type = "information-gathering" description = "Detects trojan .bat samples" sha256 = "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9" strings: $s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78 74 } $s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6d 5c 73 79 73 74 65 6d 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d } $s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c 69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 61 2e 63 61 62 } condition: all of them }
null
1,674
MAR-10478915-1.v1 Citrix Bleed
2023-12-06 07:58:07+00:00
2023-12-06
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload installation
yara
'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_02 rule_content=rule CISA_10478915_02 : trojan installs_other_components { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "installs-other-components" malware_type = "trojan" tool_type = "unknown" description = "Detects trojan PE32 samples" sha256 = "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068" strings: $s1 = { 57 72 69 74 65 46 69 6c 65 } $s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 } $s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 } $s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74 6f 72 } $s5 = { 64 65 6c 65 74 65 5b 5d } $s6 = { 4e 41 4e 28 49 4e 44 29 } condition: uint16(0) == 0x5a4d and pe.imphash() == "6e8ca501c45a9b85fff2378cffaa24b2" and pe.size_of_code == 84480 and all of them }
null
1,674
MAR-10478915-1.v1 Citrix Bleed
2023-12-06 07:58:07+00:00
2023-12-06
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload installation
yara
'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_03 rule_content=rule CISA_10478915_03 : trojan steals_authentication_credentials credential_exploitation { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "steals-authentication-credentials" malware_type = "trojan" tool_type = "credential-exploitation" description = "Detects trojan DLL samples" sha256 = "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994" strings: $s1 = { 64 65 6c 65 74 65 } $s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e } $s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 } $s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63 74 69 6f 6e 45 78 } $s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 } $s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 } condition: uint16(0) == 0x5a4d and pe.subsystem == pe.SUBSYSTEM_WINDOWS_CUI and pe.size_of_code == 56832 and all of them }
null
1,674
MAR-10478915-1.v1 Citrix Bleed
2023-12-06 07:58:07+00:00
2023-12-06
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload installation
yara
'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_04 rule_content=rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "communicates-with-c2" malware_type = "backdoor" tool_type = "remote-access" description = "Detects trojan python samples" sha256 = "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6" strings: $s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22 } $s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77 64 22 29 3a } $s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65 72 72 6f 72 } $s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74 72 28 63 6d 64 29 29 } condition: all of them }
null
1,675
AA23-339A Threat Actors Exploit Adobe ColdFusion CVE- 2023-26360 for Initial Access to Government Servers
2023-12-06 14:16:37+00:00
2023-12-06
misp-galaxy:stix-2.1-attack-pattern="f0a904f4-b3f5-4e42-b565-418dc6932d44",misp-galaxy:stix-2.1-attack-pattern="e8b9ef62-f34a-4d8c-8095-196c7e6f607d",misp-galaxy:stix-2.1-attack-pattern="84783d50-c513-428f-b288-17b4bd24821b",misp-galaxy:stix-2.1-attack-pattern="2d41cc0d-be1b-47e5-8491-ada86f624ec4",misp-galaxy:stix-2.1-attack-pattern="a1fe1a1c-ae50-4812-a064-dbec116d1fc3",misp-galaxy:stix-2.1-attack-pattern="4ff7e674-9bdb-43bf-bce4-406351ac1188",misp-galaxy:stix-2.1-attack-pattern="4c312255-f721-4a07-b49a-006387d79a2d",misp-galaxy:stix-2.1-attack-pattern="7a388102-a1e3-4f69-99a0-23d4d2344312",misp-galaxy:stix-2.1-attack-pattern="23a9ad16-95c1-4b7d-98b8-049fdd9ef8b2",misp-galaxy:stix-2.1-attack-pattern="75868d94-271e-4dac-8885-b51843a4c9d4",misp-galaxy:stix-2.1-attack-pattern="2fd37eac-035a-48f7-83da-cefa8937d859",misp-galaxy:stix-2.1-attack-pattern="be2cdeb0-048c-4aa2-8cee-0dba9687e975",misp-galaxy:stix-2.1-attack-pattern="d6d7c433-a139-43b7-9f6c-8cc6e97b8a72",misp-galaxy:stix-2.1-attack-pattern="c31d692e-0be1-4678-abf0-2e64dfb24890",misp-galaxy:stix-2.1-attack-pattern="a6c90d18-9b9d-4bdf-9cfa-b0abb5889f86",misp-galaxy:stix-2.1-attack-pattern="f8695dd5-3fa7-40c8-941f-ee8f7d8d0080",misp-galaxy:stix-2.1-attack-pattern="9a9fd346-3ca7-42ee-874b-ba706dbdcb03",misp-galaxy:stix-2.1-attack-pattern="22b606d1-33c8-4182-9ad1-9d5c7fbd7daf",misp-galaxy:stix-2.1-attack-pattern="96115b0f-f094-4ae6-bad4-e5a6715f48e0",misp-galaxy:stix-2.1-attack-pattern="9c44b26b-ebfa-402b-bf16-10fe3551bbc7",misp-galaxy:stix-2.1-attack-pattern="11d0fed1-9205-4d0f-85e5-d8b76cc3b3c1",misp-galaxy:stix-2.1-attack-pattern="351cb297-4ddc-4ee1-8e65-40b054834106",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
125.227.50.97
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
ip-dst
18.117.184.102
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
ccss-public.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
cns-lu.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
luxtrust.support
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
luxtrust.help
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
www-cns-lu.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
ip-dst
54.93.211.218
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
ip-dst
35.177.103.239
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
ip-dst
3.71.1.255
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
www-cns.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
luxtrust-cancel.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
luxtrust-unlock.com
null
1,676
Phishing targeting Luxembourg services (hosted and served on/from AWS)
2024-02-08 09:19:03+00:00
2023-12-19
phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg"
Network activity
domain
ccss-sante-lu.com
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Payload installation
vulnerability
CVE-2023-36025
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
5.181.159.29
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
79.110.62.96
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
heilee.com
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
kairoscounselingmi.com
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
nathumvida.org
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
searcherbigdealk.com
null
1,677
OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
2023-12-22 10:25:22+00:00
2023-12-22
type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
zxcdota2huysasi.com
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
206.189.208.156
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
gpoaccess.com
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
webb-institute.com
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
domain
symantke.com
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
75.145.243.85
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
47.207.9.89
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
98.160.48.170
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
173.220.106.166
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
73.128.178.221
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
50.243.177.161
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
50.213.208.89
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
64.24.179.210
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
75.145.224.109
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
50.215.39.49
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
71.127.149.194
null
1,678
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
2024-01-11 09:17:31+00:00
2024-01-11
misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear
Network activity
ip-dst
173.53.43.7
null
1,679
A host (hosted in RU) with only phishing websites
2024-01-30 10:15:05+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,phishing:techniques="fake-website",phishing:state="unknown",misp-galaxy:mitre-attack-pattern="Phishing - T1566"
Network activity
ip-dst
213.226.123.172
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
816754f6eaf72d2e9c69fe09dcbe50576f7a052a1a450c2a19f01f57a6e13c17
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
c26da19e17423ce4cb4c8c47ebc61d009e77fc1ac4e87ce548cf25b8e4f4dc28
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
c7ddd58dcb7d9e752157302d516de5492a70be30099c2f806cb15db49d466026
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
d14122fa7883b89747f273c44b1f71b81669a088764e97256f97b4b20d945ed0
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
6f684f3a8841d5665d083dcf62e67b19e141d845f6c13ee8ba0b6ccdec591a01
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
a4e1b07bb8d6685755feca89899d9ead490efa9a6b6ccc00af6aaea071549960
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
ef792687b8bcd3c03bed4b09c4722bba921536802afe01f7cdb01cc7c3c60815
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
76902d101997df43cd6d3ac10470314a82cb73fa91d212b97c8f210d1fa8271f
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
e47b86b8df43c8c1898abef15b8b7feffe533ae4e1a09e7294dd95f752b0fbb2
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
73657c062a7cc50a3d51853ec4df904bcb291fdc9cdd08eecaecb78826eb49b6
null
1,680
OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises
2024-01-31 19:53:34+00:00
2024-01-30
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190"
Payload delivery
sha256
030eb56e155fb01d7b190866aaa8b3128f935afd0b7a7b2178dc8e2eb84228b0
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
symantke.com
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
miltonhouse.nl
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
entraide-internationale.fr
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
hostname
api.d-n-s.name
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
hostname
cpanel.netbar.org
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
clickcom.click
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
clicko.click
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
duorhytm.fun
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
line-api.com
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
areekaweb.com
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
ehangmun.com
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
domain
secure-cama.com
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
146.0.228.66
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
159.65.130.146
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
8.137.112.245
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
91.92.254.14
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
186.179.39.235
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
50.215.39.49
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
45.61.136.14
null
1,681
OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation
2024-01-31 19:55:21+00:00
2024-01-31
misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
173.220.106.166
null
1,682
OSINT - Ivanti Connect Secure: Journey to the core of the DSLog backdoor
2024-02-12 10:29:16+00:00
2024-02-12
PAP:CLEAR,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",tlp:white,type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:clear
Network activity
ip-dst
159.65.123.122
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Other
comment
This STIX file provides updated list of indicators of compromise (IOCs) associated with malicious activity reported in CISA Cybersecurity Advisory (CSA), AA22-138B, pertaining to Threat Actors Chaining VMware Vulnerabilities for Full System Control. The original CSA AA22-138B was published on May 18, 2022. On June 2, 2022, CSA AA22-138B has been updated with additional indicators of compromise (IOCs), detection signatures, as well as tactics, techniques, and procedures (TTPs) obtained from trusted third parties. The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this CSA to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE 2022-22960 separately and in combination. VMware released updates for both vulnerabilities on April 6, 2022, and, according to a trusted third party, malicious cyber actors were able to reverse engineer the updates to develop an exploit within 48 hours and quickly began exploiting the disclosed vulnerabilities in unpatched devices. CISA was made aware of this exploit a week later and added CVE-2022-22954 and CVE-2022-22960 to its catalog of Known Exploited Vulnerabilities on April 14 and April 15, respectively. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit newly released vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products. For more information about this activity, to include detection and mitigation recommendations, please see updated Advisory "AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control."
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
domain
149.248.35.200.sslip.io
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
url
https://149.248.35.200.sslip.io
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
url
http://84.38.133.149/img/icon.gif
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
url
http://84.38.133.149/img/icon1.gif
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
url
https://20.232.97.189/up/80b6ae2cea.sh
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Payload delivery
md5
f8ff5c72e8ffa2112b01802113148bd1
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Payload delivery
md5
4cd8366345ad4068feca4d417738b4bd
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
domain
sslip.io
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
83.84.74.155
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
149.248.35.200
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
212.227.198.95
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
85.203.36.66
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
8.45.41.114
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
194.31.98.141
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
192.241.67.12
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
45.72.85.172
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
209.127.110.126
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
191.102.179.197
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
115.167.53.141
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
45.72.112.245
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
100.14.239.83
null
1,683
AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control
2024-02-12 10:31:24+00:00
2022-06-02
tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear
Network activity
ip-dst
172.94.89.112
null