event_id
int64 1
1.69k
| event_title
stringlengths 8
178
| event_timestamp
stringlengths 25
25
| event_date
stringlengths 10
10
| event_tags
stringlengths 9
5.32k
| category
stringclasses 16
values | type
stringlengths 2
23
| value
stringlengths 2
22.2k
| attribute_tags
stringlengths 3
354
⌀ |
---|---|---|---|---|---|---|---|---|
1,673 | The Golden Tax Department and the Emergence of GoldenSpy Malware | 2023-12-15 12:52:45+00:00 | 2020-06-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Compromise Software Supply Chain - T1195.002" | Network activity | port | 33666 | null |
1,674 | MAR-10478915-1.v1 Citrix Bleed | 2023-12-06 07:58:07+00:00 | 2023-12-06 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload installation | yara | 'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_01 rule_content=rule CISA_10478915_01 : trojan installs_other_components
{
meta:
author = "CISA Code & Media Analysis"
incident = "10478915"
date = "2023-11-06"
last_modified = "20231108_1500"
actor = "n/a"
family = "n/a"
capabilities = "installs-other-components"
malware_Type = "trojan"
tool_type = "information-gathering"
description = "Detects trojan .bat samples"
sha256 = "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9"
strings:
$s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78 74 }
$s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6d 5c 73 79 73 74 65 6d 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d }
$s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c 69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 61 2e 63 61 62 }
condition:
all of them
} | null |
1,674 | MAR-10478915-1.v1 Citrix Bleed | 2023-12-06 07:58:07+00:00 | 2023-12-06 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload installation | yara | 'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_02 rule_content=rule CISA_10478915_02 : trojan installs_other_components
{
meta:
author = "CISA Code & Media Analysis"
incident = "10478915"
date = "2023-11-06"
last_modified = "20231108_1500"
actor = "n/a"
family = "n/a"
capabilities = "installs-other-components"
malware_type = "trojan"
tool_type = "unknown"
description = "Detects trojan PE32 samples"
sha256 = "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068"
strings:
$s1 = { 57 72 69 74 65 46 69 6c 65 }
$s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 }
$s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 }
$s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74 6f 72 }
$s5 = { 64 65 6c 65 74 65 5b 5d }
$s6 = { 4e 41 4e 28 49 4e 44 29 }
condition:
uint16(0) == 0x5a4d and pe.imphash() == "6e8ca501c45a9b85fff2378cffaa24b2" and pe.size_of_code == 84480 and all of them
} | null |
1,674 | MAR-10478915-1.v1 Citrix Bleed | 2023-12-06 07:58:07+00:00 | 2023-12-06 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload installation | yara | 'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_03 rule_content=rule CISA_10478915_03 : trojan steals_authentication_credentials credential_exploitation
{
meta:
author = "CISA Code & Media Analysis"
incident = "10478915"
date = "2023-11-06"
last_modified = "20231108_1500"
actor = "n/a"
family = "n/a"
capabilities = "steals-authentication-credentials"
malware_type = "trojan"
tool_type = "credential-exploitation"
description = "Detects trojan DLL samples"
sha256 = "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994"
strings:
$s1 = { 64 65 6c 65 74 65 }
$s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e }
$s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 }
$s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63 74 69 6f 6e 45 78 }
$s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 }
$s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 }
condition:
uint16(0) == 0x5a4d and pe.subsystem == pe.SUBSYSTEM_WINDOWS_CUI and pe.size_of_code == 56832 and all of them
} | null |
1,674 | MAR-10478915-1.v1 Citrix Bleed | 2023-12-06 07:58:07+00:00 | 2023-12-06 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload installation | yara | 'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_04 rule_content=rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access
{
meta:
author = "CISA Code & Media Analysis"
incident = "10478915"
date = "2023-11-06"
last_modified = "20231108_1500"
actor = "n/a"
family = "n/a"
capabilities = "communicates-with-c2"
malware_type = "backdoor"
tool_type = "remote-access"
description = "Detects trojan python samples"
sha256 = "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6"
strings:
$s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22 }
$s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77 64 22 29 3a }
$s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65 72 72 6f 72 }
$s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74 72 28 63 6d 64 29 29 }
condition:
all of them
} | null |
1,675 | AA23-339A Threat Actors Exploit Adobe ColdFusion CVE- 2023-26360 for Initial Access to Government Servers | 2023-12-06 14:16:37+00:00 | 2023-12-06 | misp-galaxy:stix-2.1-attack-pattern="f0a904f4-b3f5-4e42-b565-418dc6932d44",misp-galaxy:stix-2.1-attack-pattern="e8b9ef62-f34a-4d8c-8095-196c7e6f607d",misp-galaxy:stix-2.1-attack-pattern="84783d50-c513-428f-b288-17b4bd24821b",misp-galaxy:stix-2.1-attack-pattern="2d41cc0d-be1b-47e5-8491-ada86f624ec4",misp-galaxy:stix-2.1-attack-pattern="a1fe1a1c-ae50-4812-a064-dbec116d1fc3",misp-galaxy:stix-2.1-attack-pattern="4ff7e674-9bdb-43bf-bce4-406351ac1188",misp-galaxy:stix-2.1-attack-pattern="4c312255-f721-4a07-b49a-006387d79a2d",misp-galaxy:stix-2.1-attack-pattern="7a388102-a1e3-4f69-99a0-23d4d2344312",misp-galaxy:stix-2.1-attack-pattern="23a9ad16-95c1-4b7d-98b8-049fdd9ef8b2",misp-galaxy:stix-2.1-attack-pattern="75868d94-271e-4dac-8885-b51843a4c9d4",misp-galaxy:stix-2.1-attack-pattern="2fd37eac-035a-48f7-83da-cefa8937d859",misp-galaxy:stix-2.1-attack-pattern="be2cdeb0-048c-4aa2-8cee-0dba9687e975",misp-galaxy:stix-2.1-attack-pattern="d6d7c433-a139-43b7-9f6c-8cc6e97b8a72",misp-galaxy:stix-2.1-attack-pattern="c31d692e-0be1-4678-abf0-2e64dfb24890",misp-galaxy:stix-2.1-attack-pattern="a6c90d18-9b9d-4bdf-9cfa-b0abb5889f86",misp-galaxy:stix-2.1-attack-pattern="f8695dd5-3fa7-40c8-941f-ee8f7d8d0080",misp-galaxy:stix-2.1-attack-pattern="9a9fd346-3ca7-42ee-874b-ba706dbdcb03",misp-galaxy:stix-2.1-attack-pattern="22b606d1-33c8-4182-9ad1-9d5c7fbd7daf",misp-galaxy:stix-2.1-attack-pattern="96115b0f-f094-4ae6-bad4-e5a6715f48e0",misp-galaxy:stix-2.1-attack-pattern="9c44b26b-ebfa-402b-bf16-10fe3551bbc7",misp-galaxy:stix-2.1-attack-pattern="11d0fed1-9205-4d0f-85e5-d8b76cc3b3c1",misp-galaxy:stix-2.1-attack-pattern="351cb297-4ddc-4ee1-8e65-40b054834106",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 125.227.50.97 | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | ip-dst | 18.117.184.102 | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | ccss-public.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | cns-lu.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | luxtrust.support | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | luxtrust.help | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | www-cns-lu.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | ip-dst | 54.93.211.218 | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | ip-dst | 35.177.103.239 | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | ip-dst | 3.71.1.255 | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | www-cns.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | luxtrust-cancel.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | luxtrust-unlock.com | null |
1,676 | Phishing targeting Luxembourg services (hosted and served on/from AWS) | 2024-02-08 09:19:03+00:00 | 2023-12-19 | phishing:techniques="fake-website",phishing:psychological-acceptability="high",tlp:clear,misp-galaxy:mitre-attack-pattern="Phishing - T1566",type:OSINT,osint:lifetime="perpetual",tlp:white,misp-galaxy:country="luxembourg" | Network activity | domain | ccss-sante-lu.com | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Payload installation | vulnerability | CVE-2023-36025 | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 5.181.159.29 | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 79.110.62.96 | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | heilee.com | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | kairoscounselingmi.com | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | nathumvida.org | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | searcherbigdealk.com | null |
1,677 | OSINT - BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates | 2023-12-22 10:25:22+00:00 | 2023-12-22 | type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | zxcdota2huysasi.com | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 206.189.208.156 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | gpoaccess.com | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | webb-institute.com | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | domain | symantke.com | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 75.145.243.85 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 47.207.9.89 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 98.160.48.170 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 173.220.106.166 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 73.128.178.221 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 50.243.177.161 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 50.213.208.89 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 64.24.179.210 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 75.145.224.109 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 50.215.39.49 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 71.127.149.194 | null |
1,678 | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | 2024-01-11 09:17:31+00:00 | 2024-01-11 | misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",tlp:white,tlp:clear | Network activity | ip-dst | 173.53.43.7 | null |
1,679 | A host (hosted in RU) with only phishing websites | 2024-01-30 10:15:05+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,phishing:techniques="fake-website",phishing:state="unknown",misp-galaxy:mitre-attack-pattern="Phishing - T1566" | Network activity | ip-dst | 213.226.123.172 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 816754f6eaf72d2e9c69fe09dcbe50576f7a052a1a450c2a19f01f57a6e13c17 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | c26da19e17423ce4cb4c8c47ebc61d009e77fc1ac4e87ce548cf25b8e4f4dc28 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | c7ddd58dcb7d9e752157302d516de5492a70be30099c2f806cb15db49d466026 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | d14122fa7883b89747f273c44b1f71b81669a088764e97256f97b4b20d945ed0 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 6f684f3a8841d5665d083dcf62e67b19e141d845f6c13ee8ba0b6ccdec591a01 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | a4e1b07bb8d6685755feca89899d9ead490efa9a6b6ccc00af6aaea071549960 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | ef792687b8bcd3c03bed4b09c4722bba921536802afe01f7cdb01cc7c3c60815 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 76902d101997df43cd6d3ac10470314a82cb73fa91d212b97c8f210d1fa8271f | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | e47b86b8df43c8c1898abef15b8b7feffe533ae4e1a09e7294dd95f752b0fbb2 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 73657c062a7cc50a3d51853ec4df904bcb291fdc9cdd08eecaecb78826eb49b6 | null |
1,680 | OSINT - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises | 2024-01-31 19:53:34+00:00 | 2024-01-30 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190" | Payload delivery | sha256 | 030eb56e155fb01d7b190866aaa8b3128f935afd0b7a7b2178dc8e2eb84228b0 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | symantke.com | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | miltonhouse.nl | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | entraide-internationale.fr | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | hostname | api.d-n-s.name | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | hostname | cpanel.netbar.org | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | clickcom.click | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | clicko.click | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | duorhytm.fun | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | line-api.com | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | areekaweb.com | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | ehangmun.com | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | domain | secure-cama.com | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 146.0.228.66 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 159.65.130.146 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 8.137.112.245 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 91.92.254.14 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 186.179.39.235 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 50.215.39.49 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 45.61.136.14 | null |
1,681 | OSINT - Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation | 2024-01-31 19:55:21+00:00 | 2024-01-31 | misp-galaxy:country="china",misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 173.220.106.166 | null |
1,682 | OSINT - Ivanti Connect Secure: Journey to the core of the DSLog backdoor | 2024-02-12 10:29:16+00:00 | 2024-02-12 | PAP:CLEAR,misp-galaxy:mitre-attack-pattern="Exploit Public-Facing Application - T1190",tlp:white,type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:clear | Network activity | ip-dst | 159.65.123.122 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Other | comment | This STIX file provides updated list of indicators of compromise (IOCs) associated with malicious activity reported in CISA Cybersecurity Advisory (CSA), AA22-138B, pertaining to Threat Actors Chaining VMware Vulnerabilities for Full System Control.
The original CSA AA22-138B was published on May 18, 2022.
On June 2, 2022, CSA AA22-138B has been updated with additional indicators of compromise (IOCs), detection signatures, as well as tactics, techniques, and procedures (TTPs) obtained from trusted third parties.
The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this CSA to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE 2022-22960 separately and in combination.
VMware released updates for both vulnerabilities on April 6, 2022, and, according to a trusted third party, malicious cyber actors were able to reverse engineer the updates to develop an exploit within 48 hours and quickly began exploiting the disclosed vulnerabilities in unpatched devices. CISA was made aware of this exploit a week later and added CVE-2022-22954 and CVE-2022-22960 to its catalog of Known Exploited Vulnerabilities on April 14 and April 15, respectively.
Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit newly released vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products.
For more information about this activity, to include detection and mitigation recommendations, please see updated Advisory "AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control." | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | domain | 149.248.35.200.sslip.io | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | url | https://149.248.35.200.sslip.io | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | url | http://84.38.133.149/img/icon.gif | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | url | http://84.38.133.149/img/icon1.gif | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | url | https://20.232.97.189/up/80b6ae2cea.sh | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Payload delivery | md5 | f8ff5c72e8ffa2112b01802113148bd1 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Payload delivery | md5 | 4cd8366345ad4068feca4d417738b4bd | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | domain | sslip.io | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 83.84.74.155 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 149.248.35.200 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 212.227.198.95 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 85.203.36.66 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 8.45.41.114 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 194.31.98.141 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 192.241.67.12 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 45.72.85.172 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 209.127.110.126 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 191.102.179.197 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 115.167.53.141 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 45.72.112.245 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 100.14.239.83 | null |
1,683 | AA22-138B Threat Actors Chaining VMware Vulnerabilities for Full System Control | 2024-02-12 10:31:24+00:00 | 2022-06-02 | tlp:white,misp-galaxy:mitre-attack-pattern="Unix Shell - T1059.004",misp-galaxy:mitre-attack-pattern="Linux and Mac File and Directory Permissions Modification - T1222.002",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Malware - T1588.001",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="AppleScript - T1059.002",misp-galaxy:mitre-attack-pattern="Exploitation for Privilege Escalation - T1068",misp-galaxy:mitre-attack-pattern="Clear Command History - T1070.003",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-enterprise-attack-attack-pattern="Connection Proxy - T1090",misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - T1003.008",misp-galaxy:mitre-attack-pattern="Archive Collected Data - T1560",misp-galaxy:mitre-enterprise-attack-attack-pattern="Exploitation for Client Execution - T1203",misp-galaxy:mitre-attack-pattern="Web Shell - T1505.003",misp-galaxy:mitre-attack-pattern="Exploitation for Client Execution - T1203",type:OSINT,osint:lifetime="perpetual",tlp:clear | Network activity | ip-dst | 172.94.89.112 | null |