Common Information
Type | Value |
---|---|
Value |
Exploit Public-Facing Application - T1190 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | The use of software, data, or commands to take advantage of a weakness in an Internet-facing computer system or program in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL) (Citation: NVD CVE-2016-6662), standard services (like SMB (Citation: CIS Multiple SMB Vulnerabilities) or SSH), and any other applications with Internet accessible open sockets, such as web servers and related services. (Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include Exploitation for Defense Evasion. For websites and databases, the OWASP top 10 gives a good list of the top 10 most common web-based vulnerabilities. (Citation: OWASP Top 10) Detection: Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation. Platforms: Linux, Windows, macOS Data Sources: Application logs, Packet capture, Web logs, Web application firewall logs |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-09 | 14 | 静默入侵:Godzilla 无文件后门攻击 Atlassian Confluence | CTF导航 | ||
Details | Website | 2024-09-06 | 58 | CISA Alert AA24-249A: Russian GRU Unit 29155 Targeting U.S. and Global Critical Infrastructure | ||
Details | Website | 2024-09-06 | 46 | Самые интересные киберинциденты в 2023 году: внутренние угрозы и многое другое | ||
Details | Website | 2024-09-06 | 4 | A Vulnerability in SonicWall SonicOS Management Access and SSLVPN Could Allow for Unauthorized Resource Access | ||
Details | Website | 2024-09-05 | 396 | Russian Military Cyber Actors Target US and Global Critical Infrastructure | CISA | ||
Details | Website | 2024-09-05 | 22 | Multiple Vulnerabilities in Veeam Products Could Allow for Remote Code Execution | ||
Details | Website | 2024-09-03 | 46 | Most interesting IR cases in 2023: insider threats and more | ||
Details | Website | 2024-09-02 | 43 | Iranian State-Sponsored Hackers Have Become Access Brokers For Ransomware Gangsca - Cyble | ||
Details | Website | 2024-08-29 | 269 | #StopRansomware: RansomHub Ransomware | CISA | ||
Details | Website | 2024-08-28 | 62 | Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | CISA | ||
Details | Website | 2024-08-28 | 23 | AA24-241A : Joint Cybersecurity Advisory on Iran-based Cyber Actors Targeting US Organizations | ||
Details | Website | 2024-08-28 | 11 | Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem | ||
Details | Website | 2024-08-26 | 30 | Threat Intelligence Report 20th August – 26th August 2024 | ||
Details | Website | 2024-08-23 | 3 | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | ||
Details | Website | 2024-08-19 | 20 | PG_MEM: A Malware Hidden in the Postgres Processes | ||
Details | Website | 2024-08-19 | 2 | CVE-2024-7593 Detection: A Critical Vulnerability in Ivanti Virtual Traffic Manager Enables Unauthorized Admin Access - SOC Prime | ||
Details | Website | 2024-08-13 | 9 | Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution | ||
Details | Website | 2024-08-12 | 27 | You Don't Know the HAFNIUM of it... | ||
Details | Website | 2024-08-01 | 59 | DNS Early Detection - Breaking the Black Basta Ransomware Kill Chain | Infoblox | ||
Details | Website | 2024-07-29 | 7 | 2023 Activities Summary of SectorJ groups (JPN) – Red Alert | ||
Details | Website | 2024-07-26 | 22 | RansomHub Ransomware – New Infection Chains Unveiled | ||
Details | Website | 2024-07-25 | 59 | How APT groups operate in Southeast Asia | ||
Details | Website | 2024-07-22 | 2 | A Vulnerability in Cisco Secure Email Gateway Could Allow for Remote Code Execution | ||
Details | Website | 2024-07-09 | 2 | A Vulnerability in OpenSSH Could Allow for Remote Code Execution | ||
Details | Website | 2024-07-05 | 12 | Turning Jenkins Into a Cryptomining Machine From an Attackers Perspective |