threat-intelligence-report


Trends


  • The top attacker country was China with 1564 unique attackers (25%)
  • The top Exploit event was Authentication with 50% of occurrences.
  • The top Trojan C&C server detected was Heodo with 6 instances detected.



Top Attacker by Country


CountryOccurrencesPercentage
China156425.70%
United States135022.19%
Korea3445.65%
Russian Federation3345.49%
Brazil3345.49%
France3175.21%
India2734.49%
United Kingdom2514.12%
Vietnam1893.11%
Taiwan1602.63%
Canada1412.32%
Italy1272.09%
Germany1272.09%
Indonesia1191.96%
Hong Kong1091.79%
Netherlands1021.68%
Spain851.40%
Mexico811.33%
Turkey781.28%


Top Cyber Attackers by Country September 30 - October 6 2019




Threat Geo-location




Cyber Security Threat Geolocations September 30 - October 6 2019



Top Attacking Hosts


HostOccurrences
1.203.115.141440
2.136.131.36383
1.179.182.82357
1.129.104.203318
1.9.46.177294
3.10.117.77147
3.9.165.23138
3.8.56.50132



Top Attacker Hosts September 30 - October 6 2019



Top Network Attackers


Origin ASAnnouncementDescription
AS48471.203.0.0/16CHINANET Beijing Province Network
AS33522.136.0.0/16Red de servicios IP
AS239691.179.128.0/17TOT Public Company Limited




Top Event NIDS and Exploits




Top Event NIDS September 30 - October 6 2019




Top Event Exploits September 30 - October 6 2019




Top Alarms



Type of AlarmOccurrences
Bruteforce Authentication2035
Intrusion Detection2879
Network Discovery20


Comparison from last week 


Type of AlarmOccurrences
Bruteforce Authentication256
Network Discovery IDS Event195
Network Anomaly - IDS Event18
Database Attack - Stored Procedure Access - Attack6



Top Cyber Security Alarms



Remote Access Trojan C&C Servers Found


NameNumber DiscoveredLocation
Heodo6179.12.170.88, 181.230.126.152,
187.155.233.46, 198.199.88.162,
201.250.11.236, 86.98.25.30 
Keitaro25.188.231.211, 5.8.88.124
LokiBot147.254.66.50 
TrickBot4178.252.26.235, 185.222.202.62,
194.5.250.79, 66.55.71.15



Trojan C&C Servers September 30 - October 6 2019



Common Malware



Malware TypeMD5Typical Filename

W32.7ACF
71AFA8-95.
SBX.TG

4a5078
0ddb3d
b16eba
b57b0c
a42da0
fb
xme64-2141.exe

Win.Trojan.
Generic::
in10.talos

47b97d
e62ae8
b2b927
542aa5
d7f3c8
58
qmreportupload.exe
PUA.Win.
Trojan.Remote
exec::tpd
fbc6bd
8bf115
cb3f93
a520d2
2b054b
90
NA

W32.Agent
WDCR:Gen.
21gn.1201

e2ea31
5d9a83
e75770
53f52c
974f6a
5a
c3e530cc005583b
47322b6649ddc0d
ab1b64bcf22b124a
492606763c52fb04
8f.bin
W32.Generic
:Gen.22fz.
1201
799b30
f47060
ca05d8
0ece53
866e01
cc
mf2016341595.exe



CVEs For Which Public Exploits Have Been Detected


ID:        CVE-2019-1367
Title:    Microsoft Internet Explorer Remote Code Execution Vulnerability 
Vendor:    Microsoft
Description: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website, for example, by sending an email.
Note: This CVE ID is unique from CVE-2019-1221.
CVSS v2 Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)


ID:        CVE-2019-16097
Title:    Harbor Remote Privilege Escalation Vulnerability  
Vendor:    Multi-Vendor
Description: A vulnerability in the POST /api/users API of Harbor may allow for a remote escalation of privilege. A malicious attacker with network access to a Harbor POST /api/users API could self-register a new account with administrative privileges. Successful exploitation of this issue may lead to a complete compromise of the Harbor deployment.
CVSS v2 Base Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)


ID:        CVE-2019-15943
Title:    Counter-Strike Global Offensive Remote Code Execution Vulnerability  
Vendor:    valvesoftware
Description: Counter-Strike Global Offensive (vphysics.dll) allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, using a crafted map that causes memory corruption vulnerability.
CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)


Details