threat-intelligence-report

Trends


  • The top attacker country was China with 2396 unique attackers (25.87%)
  • The top Exploit event was Miscellaneous with 44% of occurrences



Top Attacker by Country


CountryOccurrencesPercentage
China239625.87%
United States204022.03%
France5976.45%
Brazil5606.05%
India4624.99%
Korea4444.79%
Russia4214.55%
United Kingdom3523.80%
Canada2702.92%
Germany2642.85%
Australia2232.41%
Vietnam2022.18%
Taiwan1902.05%
Netherlands1821.97%
Italy1801.94%
Indonesia1461.58%
Singapore1321.43%
Greece1011.09%
Ukraine1001.08%


Top Cyber Attackers by Country March 25-30 2019



Threat Geo-location


Cyber Security Threat Geolocations March 25-30 2019




Top Attacking Hosts


HostOccurrences
194.230.35.137287
218.92.0.191178
23.53.241.4098
188.168.154.3590




Top Network Attackers


Origin ASAnnouncementDescription
AS53889192.230.32.0/19Micfo, LLC
AS4134218.92.0.0/16CHINANET Jiangsu Province Network
AS3599423.32.0.0/11Akamai Technologies, Inc.
AS15774188.168.0.0/16Closed Joint Stock Company TransTeleCom



Exploit Event Types and Top Event NIDS


Top Event NIDS and Exploits March 25-30 2019




Top Alarms



Type of AlarmNo. of Occurrences
Red Piranha HIDS: IDS Event3073
Suspicious Behaviour - SSH276
OTX Indicators of Compromise - PULSE147
Stored Procedure Access - Attack55
Attack Tool Detected - Attack45
Bruteforce Authentication - SSH43
WebServer Attack - Attack39
Network Discovery - Scan SSH32
Hacking Tool - Squid Event8

                 
Comparison from last week

Type of AlarmNo. of Occurrences
Red Piranha HIDS: IDS Event1536
OTX Indicators of Compromise - PULSE109
Network Discovery - Scan SSH71
Database Attack - Stored Procedure Access - Attack56
Attack Tool Detected - Attack19
System Compromise - Suspicious Behaviour - SSH14
Delivery & Attack - WebServer Attack - Attack10
Delivery & Attack - Network Discovery - IDS Event9
Delivery & Attack - Bruteforce Authentication - SSH4
Environmental Awareness - Trojan infection - IDS Event2




CVE


This is a list of recent vulnerabilities for which exploits are available.

ID:       CVE-2019-9948
Title:     Python urllib Security Bypass Vulnerability
Vendor: Python

ID:     CVE-2019-9956
Title:     ImageMagick Stack Buffer Overflow Vulnerability
Vendor: ImageMagick

ID:        CVE-2019-9797, CVE-2019-9798, CVE-2019-9799, CVE-2019-9802, CVE-2019-9803, CVE-2019-9804, CVE-2019-9805, CVE-2019-9806, CVE-2019-9807, CVE-2019-9809, CVE-2019-9808, CVE-2019-9789
Title:     Mozilla Firefox Multiple Security Vulnerabilities
Vendor: Mozilla Firefox

ID:     CVE-2019-9970
Title:     Signal Homograph Domain Spoofing Vulnerability
Vendor: Signal

ID:     CVE-2019-9977
Title:     Tesla Unspecified Arbitrary Code Execution Vulnerability
Vendor: Tesla

ID:     CVE-2018-18065
Title:     Net-SNMP Remote Denial of Service Vulnerability
Vendor: Net-SNMP

ID:     CVE-2019-9020, CVE-2019-9021, CVE-2019-9023, CVE-2019-9024
Title:     PHP Information Disclosure and Heap Buffer Overflow Vulnerabilities
Vendor: PHP

ID:     CVE-2019-5787, CVE-2019-5788, CVE-2019-5789
Title:     Google Chrome Use After Free Vulnerability
Vendor: Google


Vulnerabilities


Cisco IOS and IOS XE Software CVE-2019-1762 Local Information Disclosure Vulnerability
2019-03-27
securityfocus.com/bid/107594

Cisco IOS XE Software CVE-2019-1743 Arbitrary File Upload Vulnerability
2019-03-27
securityfocus.com/bid/107591

Cisco IOS XE Software CVE-2019-1754 Remote Privilege Escalation Vulnerability
2019-03-27
securityfocus.com/bid/107590

Top Attacker Hosts March 25-30 2019
Details