Threat Actors Exploit Accellion FTA for Data Theft and Extortion
Tags
Common Information
Type | Value |
---|---|
UUID | a03b24bc-2019-48fe-8d3f-8dd8b365c229 |
Fingerprint | 381f901b09a58be1 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Feb. 22, 2021, midnight |
Added to db | Nov. 8, 2023, 11:07 p.m. |
Last updated | Nov. 17, 2024, 5:55 p.m. |
Headline | Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion |
Title | Threat Actors Exploit Accellion FTA for Data Theft and Extortion |
Detected Hints/Tags/Attributes | 84/3/32 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 330 | ✔ | Threat Intelligence | https://www.mandiant.com/resources/blog/rss.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 20 | cve-2021-27101 |
|
Details | CVE | 16 | cve-2021-27102 |
|
Details | CVE | 17 | cve-2021-27103 |
|
Details | CVE | 17 | cve-2021-27104 |
|
Details | Domain | 2 | admin.pl |
|
Details | Domain | 1 | onion.dog |
|
Details | Domain | 2 | support-box.com |
|
Details | 2 | unlock@support-box.com |
||
Details | File | 3 | document_root.html |
|
Details | File | 3 | sftp_account_edit.php |
|
Details | File | 2 | admin.pl |
|
Details | File | 17 | about.html |
|
Details | File | 3 | adminpl.log |
|
Details | File | 1 | cache.js |
|
Details | File | 9 | webshell.php |
|
Details | md5 | 4 | 11454bd782bb41db213d415e10a0fb3c |
|
Details | md5 | 3 | bdfd11b1b092b7c61ce5f02ffc5ad55a |
|
Details | md5 | 1 | 2798c0e836b907e8224520e7e6e4bb42 |
|
Details | sha256 | 2 | 5fa2b9546770241da7305356d6427847598288290866837626f621d794692c1b |
|
Details | sha256 | 3 | 2e0df09fa37eabcae645302d9865913b818ee0993199a6d904728f3093ff48c7 |
|
Details | IPv4 | 3 | 45.135.229.179 |
|
Details | IPv4 | 2 | 79.141.162.82 |
|
Details | IPv4 | 2 | 155.94.160.40 |
|
Details | IPv4 | 1 | 192.154.253.120 |
|
Details | IPv4 | 2 | 192.52.167.101 |
|
Details | IPv4 | 3 | 194.88.104.24 |
|
Details | Mandiant Security Validation Actions | 1 | A101-515 |
|
Details | Mandiant Security Validation Actions | 1 | A101-516 |
|
Details | Mandiant Uncategorized Groups | 8 | UNC2546 |
|
Details | Mandiant Uncategorized Groups | 3 | UNC2582 |
|
Details | Threat Actor Identifier - FIN | 127 | FIN11 |
|
Details | Yara rule | 1 | rule DEWMODE_PHP_Webshell { strings: $s1 = /if \(isset\(\$_REQUEST\[[\x22\x27]dwn[\x22\x27]]\)[\x09\x20]{0,32}&&[\x09\x20]{0,32}isset\(\$_REQUEST\[[\x22\x27]fn[\x22\x27]\]\)\)\s{0,256}\{/ $s2 = "<th>file_id</th>" $s3 = "<th>path</th>" $s4 = "<th>file_name</th>" $s5 = "<th>uploaded_by</th>" $s6 = "target=\\\"_blank\\\">Download</a></td>" $s7 = "Content-Type: application/octet-stream" $s8 = "Content-disposition: attachment; filename=" condition: all of them } |