Cobalt Stike Beacon Detected – 123[.]60[.]165[.]221:443
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: fd178725fc7ebd4257d17a823158bec5SHA1: 81c0dcd1dc7a5936ace3c7036b00c499b54afd04ANALYSIS DATE:...
Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: c9afe5085553d1b7b388cc818b7b5a09SHA1: 425e3328364a93e49a8036bf3413134146e7e5a0ANALYSIS DATE: 2023-02-02T11:05:38ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 7d0e275d70fd5a61b05f4280fdd787f5SHA1: f7751017be5c626cfb3b48729e2a60ad4cf31fa2ANALYSIS DATE: 2023-02-02T11:53:59ZTTPS: T1053, T1005, T1081, T1012,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: f37020074e448e23dc8752c70329907dSHA1: 6b6e63ed1f66e9fd987419c249b473b212170eb0ANALYSIS DATE: 2023-02-02T11:11:35ZTTPS: T1060, T1112, T1053, T1005,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: b0d836844b04e4a6f4b5ca87cb6ce63eSHA1: 8d98770e78655f835711c6ec4c824b51615a6182ANALYSIS DATE:...
The Information provided at the time of posting was detected as "Empire C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
NAME__________LIVEBOX Collaboration vDesk privilege escalationPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Gain Privilege DESCRIPTION__________LIVEBOX Collaboration vDesk could allow a remote attacker to gain elevated privileges...
NAME__________Ampache cross-site scriptingPlatforms Affected:Risk Level:9.3Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Ampache is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A...
NAME__________Tenable tenable.io, tenable.sc and Nessus privilege escalationPlatforms Affected:Tenable Network Security Nessus Tenable Tenable.io Tenable Tenable.scRisk Level:9.1Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Tenable tenable.io, tenable.sc...
NAME__________Serenissima Informatica FastCheckIn directory traversalPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Serenissima Informatica FastCheckIn could allow a remote attacker to traverse directories on...
NAME__________Trend Micro Apex One file uploadPlatforms Affected:Risk Level:8.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Trend Micro Apex could allow a remote attacker to upload arbitrary...
NAME__________Dompdf code executionPlatforms Affected:Risk Level:10Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dompdf could allow a remote attacker to execute arbitrary code on the system, caused...
NAME__________reason-jose security bypassPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________reason-jose could allow a remote authenticated attacker to bypass security restrictions, caused by improper...
NAME__________OrangeScrum directory traversalPlatforms Affected:Risk Level:8.1Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________OrangeScrum could allow a remote authenticated attacker to traverse directories on the...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-26485Removing an XSLT parameter during processing could have lead to an exploitable...