threat-intelligence-report


Trends


  • The top attacker country was China with 874 unique attackers (33%)
  • The top Exploit event was Miscellaneous with 65% of occurrences.
  • The top Trojan C&C server detected was TrickBot with 36 instances detected.



Top Attacker by Country


CountryOccurrencesPercentage
China87425.30%
United States83624.20%
France2116.40%
Russian Federation2055.93%
Brazil1815.24%
Republic of Korea1664.80%
United Kingdom1303.76%
India1133.27%
Canada982.84%
Germany972.81%
Vietnam912.63%
Netherlands842.43%
Italy722.08%
Indonesia601.74%
Taiwan581.68%
Spain511.48%
Thailand411.19%
Romania391.13%
Singapore381.10%



Top Cyber Attackers by Country  September 23-29 2019



Threat Geo-location




Cyber Security Threat Geolocations September 23-29 2019



Top Attacking Hosts


HostOccurrences
218.92.0.191131
112.85.42.187106
185.94.111.118
66.240.205.3412



Top Attacker Hosts September 23-29 2019



Top Network Attackers


Origin ASAnnouncementDescription
AS4134218.92.0.0/16CHINANET jiangsu province network
AS483712.80.0.0/13China Unicom Jiangsu province network
AS1043966.240.192.0/18CariNet, Inc




Top Event NIDS and Exploits




Top Event NIDS September 23-29 2019



Top Event Exploits September 23-29 2019




Top Alarms


Type of AlarmOccurrences
Bruteforce Authentication256
Network Discovery IDS Event195
Network Anomaly - IDS Event18
Database Attack - Stored Procedure Access - Attack6


Comparison from last week 

Type of AlarmOccurrences
WebServer Attack1433
Bruteforce Authentication320
Attack Tool Detected96
Network Discovery26
Network Anomaly22
Database attack2



Top Cyber Security Alarms September 23-29 2019



Remote Access Trojan C&C Servers Found


NameNumber DiscoveredLocation
Agent Tesla1161.117.182.74
AlphaStealer1178.208.83.42
Azorult2185.173.178.77, 185.224.138.189
Heodo13142.44.162.209, 149.202.153.251,
162.241.130.39, 181.188.149.134,
183.82.97.25, 192.241.175.184,
201.212.57.109, 203.130.0.67,
5.67.96.120, 75.127.14.170,
77.245.101.134, 92.222.125.16,
93.78.205.196
keitaro169.16.254.181
Kpot15.188.60.52
LokiBot2161.117.182.74 , 47.88.102.244
PredatorTheThief189.41.173.142
TrickBot36104.168.123.186, 107.155.137.4,
107.172.143.155, 139.60.163.36,
148.251.27.94, 178.170.189.52,
178.33.26.175, 181.113.20.186,
181.129.96.74, 185.141.27.223,
185.141.27.237, 185.215.148.133,
185.251.38.201, 185.252.144.190,
185.66.14.149, 186.46.88.62,
194.5.250.57, 194.5.250.60,
195.123.238.110, 195.123.238.83,
195.123.247.27, 198.12.71.210,
200.116.199.10, 200.21.51.38,
200.29.106.33, 23.94.24.196,
37.18.30.165, 37.228.117.182,
5.101.51.101, 51.77.202.8,
51.77.254.186, 64.44.51.126,
79.124.49.209, 79.124.49.210,
92.243.92.8, 92.38.171.26



Trojan C&C Servers September 23-29 2019



Common Malware



Malware TypeMD5Typical Filename

W32.7ACF
71AFA8-95.
SBX.TG

4a5078
0ddb3d
b16eba
b57b0c
a42da0
fb
xme64-2141.exe

Win.Trojan.
Generic::
in10.talos

47b97d
e62ae8
b2b927
542aa5
d7f3c8
58
qmreportupload.exe
W32.Generic:
Gen.22fz.
1201
799b30
f47060
ca05d8
0ece53
866e01
cc
mf2016341595.exe

W32.Agent
WDCR:Gen.
21gn.1201

e2ea31
5d9a83
e75770
53f52c
974f6a
5a
c3e530cc005583b
47322b6649ddc0d
ab1b64bcf22b124a
492606763c52fb04
8f.bin
W32.46B24
1E3D3-95.
SBX.TG
db69ea
aea4d4
9703f1
61c81e
6fdd03
6f
xme32-2141-gcc.exe



CVEs For Which Public Exploits Have Been Detected


Title:    Microsoft SharePoint Persistent Cross-Site Scripting Vulnerability
Vendor:    Microsoft
Description: A cross-site-scripting vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.
CVSS v2 Base Score:    3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)


ID:        CVE-2019-1579
Title:    HPE Intelligent Management Center Information Disclosure Vulnerability
Vendor:    HPE
Description: An information disclosure vulnerability exists in HPE Intelligent Management Center due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this to allow unauthenticated access.
CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)


ID:        CVE-2019-16531
Title:    LayerBB Cross-Site Request Forgery Vulnerability
Vendor:    LayerBB
Description: LayerBB has multiple Cross site request forgery issues such as editing user profiles and forums. These can be demonstrated by changing the System Settings via admin/general.php.
CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)


ID:        CVE-2019-16399
Title:    Western Digital My Book World II NAS Authentication Bypass Vulnerability
Vendor:    Western Digital
Description: An Authentication Bypass Vulnerability exists in Western Digital WD My Book World, which allows an attacker to access the /admin/ directory without credentials. An attacker can easily enable SSH from /admin/system_advanced.php?lang=en and login with the default root password welc0me.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)


Title: Microsoft Windows AppXSvc Elevation of Privilege Vulnerability
Vendor: Microsoft
Description: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'.
Note: This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.
CVSS v2 Base Score:    7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Details