Common Information
Type Value
Value
Exploit Public-Facing Application - T1190
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description The use of software, data, or commands to take advantage of a weakness in an Internet-facing computer system or program in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL) (Citation: NVD CVE-2016-6662), standard services (like SMB (Citation: CIS Multiple SMB Vulnerabilities) or SSH), and any other applications with Internet accessible open sockets, such as web servers and related services. (Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include Exploitation for Defense Evasion. For websites and databases, the OWASP top 10 gives a good list of the top 10 most common web-based vulnerabilities. (Citation: OWASP Top 10) Detection: Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation. Platforms: Linux, Windows, macOS Data Sources: Application logs, Packet capture, Web logs, Web application firewall logs
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-13 23 T.A. — RansomHub
Details Website 2024-11-12 19 Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution
Details Website 2024-11-09 19 TRACKING RANSOMWARE : OCTOBER 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-08 25 Dark Web Profile: CosmicBeetle (NoName) Ransomware - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-07 7 Mapping CTF Techniques to the MITRE ATT&CK Framework: TryHack3M: Bricks Heist
Details Website 2024-11-06 2 A Vulnerability in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Could Allow for Remote Code Execution
Details Website 2024-11-04 57 Threat Intelligence Report October 29 - November 4 2024 | Red Piranha
Details Website 2024-11-03 35 Threat Actor — Cl0P
Details Website 2024-11-01 43 Ngioweb Remains Active 7 Years Later
Details Website 2024-11-01 39 Dark Web Profile: Tropic Trooper (APT23) - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-30 43 Investigating a SharePoint Compromise: IR Tales from the Field | Rapid7 Blog
Details Website 2024-10-30 379 从目录浏览分析幽盾攻击组织-安全客 - 安全资讯平台
Details Website 2024-10-30 28 Attacker Abuses Victim Resources to Reap Rewards from Titan Network
Details Website 2024-10-29 19 Ransomware: Kill Security
Details Website 2024-10-29 5 Multiple Vulnerabilities in Siemens InterMesh Subscriber Devices Could Allow for Remote Code Execution
Details Website 2024-10-28 3 CVE-2024-47575 Detection: FortiManager API Vulnerability Exploited in Zero-Day Attacks - SOC Prime
Details Website 2024-10-28 376 Inside the Open Directory of the “You Dun” Threat Group
Details Website 2024-10-28 25 Threat Intelligence Report October 22 - October 28 2024 | Red Piranha
Details Website 2024-10-25 30 TeamTNT’s Docker Gatling Gun Campaign
Details Website 2024-10-23 2 A Vulnerability in Fortinet FortiManager Could Allow for Remote Code Execution
Details Website 2024-10-22 22 Threat Intelligence Report October 15 - October 21 2024 | Red Piranha
Details Website 2024-10-22 13 Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach
Details Website 2024-10-19 21 Unmasking the Cyber Mirage: A Journey Through Gulf Region Cyberattacks