CNCERT:物联网安全威胁情报月报 (2019年9月)
Tags
attack-pattern: | Exploits - T1587.004 Exploits - T1588.005 |
Common Information
Type | Value |
---|---|
UUID | ca950bcb-f983-4c6e-bb88-47b2299278ef |
Fingerprint | fe3c3f073f9dfba2 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Oct. 23, 2019, midnight |
Added to db | Dec. 20, 2024, 2:45 a.m. |
Last updated | Dec. 25, 2024, 10:29 a.m. |
Headline | CNCERT:物联网安全威胁情报月报 (2019年9月) |
Title | CNCERT:物联网安全威胁情报月报 (2019年9月) |
Detected Hints/Tags/Attributes | 13/1/17 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.secrss.com/articles/14521 |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 53 | cve-2018-10561 |
|
Details | CVE | 51 | cve-2018-10562 |
|
Details | CVE | 84 | cve-2017-17215 |
|
Details | CVE | 85 | cve-2014-8361 |
|
Details | Domain | 2 | scan.rapeme.fun |
|
Details | Domain | 25 | www.anquanke.com |
|
Details | Domain | 95 | securityaffairs.co |
|
Details | Domain | 5 | xlab.tencent.com |
|
Details | Domain | 6752 | 163.com |
|
Details | File | 1 | gpon-home-routers-hack.html |
|
Details | IPv4 | 1 | 142.11.217.116 |
|
Details | Url | 1 | https://blog.netlab.360.com/wa-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869 |
|
Details | Url | 2 | https://blog.trendmicro.com/trendlabs-security-intelligence/open-adb-ports-being-exploited-to-spread-possible-satori-variant-in-android-devices |
|
Details | Url | 1 | https://www.anquanke.com/post/id/85006 |
|
Details | Url | 1 | https://securityaffairs.co/wordpress/71987/hacking/gpon-home-routers-hack.html |
|
Details | Url | 1 | https://xlab.tencent.com/cn/2018/01/05/a-new-way-to-exploit-cve-2017-17215 |
|
Details | Url | 1 | https://isc.sans.edu/forums/diary/when |