misp-circl-feed/feeds/circl/stix-2.1/c578cb44-e440-486d-80a4-8cf6256c1d53.json

479 lines
40 KiB
JSON
Raw Permalink Normal View History

2023-12-14 14:30:15 +00:00
{
"type": "bundle",
"id": "bundle--c578cb44-e440-486d-80a4-8cf6256c1d53",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
2023-12-14 14:30:15 +00:00
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--c578cb44-e440-486d-80a4-8cf6256c1d53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
2023-12-14 14:30:15 +00:00
"name": "AA23-335A: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities",
2024-04-05 12:15:17 +00:00
"published": "2023-12-15T08:49:17Z",
2023-12-14 14:30:15 +00:00
"object_refs": [
"indicator--b4097d04-408a-4279-aac4-40ae3dd0710f",
"indicator--95a83932-6e7a-4024-b3f5-d878d78fd1d0",
"indicator--eb825787-5cf3-423a-aec9-42d611cc61e1",
"indicator--695afe84-7eb6-4004-a7e1-2ad80bfa5131",
"indicator--b74311f5-0fc4-4fda-a6c3-3a13cf1d3069",
2024-04-05 12:15:17 +00:00
"vulnerability--8f057a13-41e4-4e2f-ade8-19802a62f278",
2023-12-14 14:30:15 +00:00
"x-misp-object--0025bc8f-1af0-48a6-9534-e82af80ee21c",
2024-04-05 12:15:17 +00:00
"x-misp-object--157412c1-046a-4e74-99f8-84a148792839",
"vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"x-misp-object--25eafc23-5529-4c84-9cb9-13df3517f784",
"attack-pattern--ea5919da-346f-4b22-89c3-6dfeef61dba8",
"attack-pattern--5d27dada-7e8c-45bf-8237-e2acf772667b",
2024-08-07 08:13:15 +00:00
"relationship--57c782b3-52c9-4b2a-9519-99df90a7ee63",
"relationship--d49a9675-d0bf-4c42-aa91-cac30dc8ee21",
"relationship--873f6481-5c44-4c4c-b835-101eb2047a5d",
"relationship--6b033f95-324a-4427-92d7-b38a95729117"
2023-12-14 14:30:15 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:stix-2.1-attack-pattern=\"9a280255-c770-4d42-ae50-aff1896ebded\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"tlp:clear"
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b4097d04-408a-4279-aac4-40ae3dd0710f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-04T20:38:04.000Z",
"modified": "2023-12-04T20:38:04.000Z",
"pattern": "[file:hashes.SHA256 = '440b5385d3838e3f6bc21220caa83b65cd5f3618daea676f271c3671650ce9a3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-13T00:00:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95a83932-6e7a-4024-b3f5-d878d78fd1d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-04T20:38:04.000Z",
"modified": "2023-12-04T20:38:04.000Z",
"pattern": "[file:hashes.SHA1 = '66ae21571faee1e258549078144325dc9dd60303']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-13T00:00:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb825787-5cf3-423a-aec9-42d611cc61e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-04T20:38:04.000Z",
"modified": "2023-12-04T20:38:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.162.227.180']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-13T00:00:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--695afe84-7eb6-4004-a7e1-2ad80bfa5131",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-04T20:38:04.000Z",
"modified": "2023-12-04T20:38:04.000Z",
"pattern": "[file:hashes.MD5 = 'ba284a4b508a7abd8070a427386e93e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-13T00:00:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b74311f5-0fc4-4fda-a6c3-3a13cf1d3069",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-04T20:38:04.000Z",
"modified": "2023-12-04T20:38:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.162.235.206']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-14T00:00:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
2024-04-05 12:15:17 +00:00
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8f057a13-41e4-4e2f-ade8-19802a62f278",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-15T08:48:48.000Z",
"modified": "2023-12-15T08:48:48.000Z",
"name": "CVE-2023-6448",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"Payload delivery\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6448"
}
]
},
2023-12-14 14:30:15 +00:00
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0025bc8f-1af0-48a6-9534-e82af80ee21c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-05T07:48:53.000Z",
"modified": "2023-12-05T07:48:53.000Z",
"labels": [
"misp:name=\"original-imported-file\"",
"misp:meta-category=\"file\""
],
"x_misp_attributes": [
{
"type": "attachment",
"object_relation": "imported-sample",
"value": "AA23-335A-IRGC-Affiliated-Cyber-Actors-Exploit-PLCs-in-Multiple-Sectors-Including-US-Water-and-Wastewater-Systems-Facilities.stix_.json",
"category": "External analysis",
"uuid": "63b59f7b-462d-4bdb-9861-b2de803a358c",
"data": "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
},
{
"type": "text",
"object_relation": "format",
"value": "STIX 2.1",
"category": "Other",
"uuid": "a8bc59ca-67e3-4e50-acd3-c1867a2acc3c"
}
],
"x_misp_meta_category": "file",
"x_misp_name": "original-imported-file"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--157412c1-046a-4e74-99f8-84a148792839",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-05T07:54:14.000Z",
"modified": "2023-12-05T07:54:14.000Z",
"labels": [
"misp:name=\"report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "link",
"value": "https://www.cisa.gov/sites/default/files/2023-12/AA23-335A-IRGC-Affiliated-Cyber-Actors-Exploit-PLCs-in-Multiple-Sectors-Including-US-Water-and-Wastewater-Systems-Facilities.stix_.json",
"category": "External analysis",
"uuid": "c6fbcbef-c300-445b-85d0-025c748f5545"
},
{
"type": "text",
"object_relation": "summary",
"value": "The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD)\\\\u2014hereafter referred to as \"the authoring agencies\" - are disseminating this joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity against operational technology devices by Iranian Government Islamic Revolutionary Guard Corps IRGC)-affiliated Advanced Persistent Threat (APT) cyber actors. \\r\\n\\r\\nThe IRGC is an Iranian military organization that the United States designated as a foreign terrorist organization in 2019. IRGC-affiliated cyber actors using the persona \\\\u201cCyberAv3ngers\\\\u201d are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs). These PLCs are commonly used in the Water and Wastewater Systems (WWS) Sector and are additionally used in other industries including, but not limited to, energy, food and beverage manufacturing, and healthcare. The PLCs may be rebranded and appear as different manufacturers and companies. In addition to the recent CISA Alert, the authoring agencies are releasing this joint CSA to share indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with IRGC cyber operations.\\r\\n",
"category": "Other",
"uuid": "548e3b68-36bd-4297-b825-3cadd87fc1c7"
}
],
"x_misp_comment": "\"AA23-335A: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities",
"x_misp_meta_category": "misc",
"x_misp_name": "report"
},
2024-04-05 12:15:17 +00:00
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"name": "CVE-2023-6448",
"description": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6448"
},
{
"source_name": "url",
"url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems"
},
{
"source_name": "url",
"url": "https://www.unitronicsplc.com/cyber_security_vision-samba/"
},
{
"source_name": "url",
"url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic\\\\%209.9.00\\\\%20Version\\\\%20changes.pdf"
}
],
"x_misp_cvss_score": "9.8",
"x_misp_cvss_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"x_misp_modified": "2023-12-13T17:15:00+00:00",
"x_misp_published": "2023-12-05T18:15:00+00:00",
"x_misp_state": "Published",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:unitronics:vision1210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision1210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision1040_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision1040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:unitronics:vision120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitronics:vision120:-:*:*:*:*:*:*:*"
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--25eafc23-5529-4c84-9cb9-13df3517f784",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"labels": [
"misp:name=\"weakness\"",
"misp:meta-category=\"vulnerability\""
],
"x_misp_attributes": [
{
"type": "weakness",
"object_relation": "id",
"value": "CWE-798",
"category": "External analysis",
"uuid": "b29a1b99-ff49-4ab7-80da-3267910b36ac"
},
{
"type": "text",
"object_relation": "name",
"value": "Use of Hard-coded Credentials",
"category": "Other",
"uuid": "7ab12f43-9356-45b0-b368-91f2b682750d"
},
{
"type": "text",
"object_relation": "status",
"value": "Draft",
"category": "Other",
"uuid": "d64d1466-dc39-45ee-b281-0f7332c5564d"
},
{
"type": "text",
"object_relation": "weakness-abs",
"value": "Base",
"category": "Other",
"uuid": "a4cb95b3-7531-4f14-bce9-df6c266964df"
}
],
"x_misp_comment": "CVE-2023-6448: Enriched via the cve_advanced module",
"x_misp_meta_category": "vulnerability",
"x_misp_name": "weakness"
},
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--ea5919da-346f-4b22-89c3-6dfeef61dba8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"name": "Try Common or Default Usernames and Passwords",
"description": "An adversary may try certain common or default usernames and passwords to gain access into the system and perform unauthorized actions. An adversary may try an intelligent brute force using empty passwords, known vendor default credentials, as well as a dictionary of common usernames and passwords. Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. \\\\\"secret\\\\\" or \\\\\"password\\\\\") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary.",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "vulnerability"
}
],
"labels": [
"misp:name=\"attack-pattern\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "capec",
"external_id": "CAPEC-70"
}
],
"x_misp_prerequisites": "The system uses one factor password based authentication.The adversary has the means to interact with the system.",
"x_misp_related_weakness": [
"CWE-262",
"CWE-263",
"CWE-308",
"CWE-309",
"CWE-521",
"CWE-654",
"CWE-798"
],
"x_misp_solutions": "Delete all default account credentials that may be put in by the product vendor. Implement a password throttling mechanism. This mechanism should take into account both the IP address and the log in name of the user. Put together a strong password policy and make sure that all user created passwords comply with it. Alternatively automatically generate strong passwords for users. Passwords need to be recycled to prevent aging, that is every once in a while a new password must be chosen."
},
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--5d27dada-7e8c-45bf-8237-e2acf772667b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"name": "Read Sensitive Constants Within an Executable",
"description": "An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable.\n These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines that can be revealed by code refactoring methods including static and dynamic analysis. One specific example of a sensitive string is a hard-coded password. Typical examples of software with hard-coded passwords include server-side executables which may check for a hard-coded password or key during a user\\'s authentication with the server. Hard-coded passwords can also be present in client-side executables which utilize the password or key when connecting to either a remote component, such as a database server, licensing server, or otherwise, or a processes on the same host that expects a key or password. When analyzing an executable the adversary may search for the presence of such strings by analyzing the byte-code of the file itself. Example utilities for revealing strings within a file include \\'strings,\\' \\'grep,\\' or other variants of these programs depending upon the type of operating system used. These programs can be used to dump any ASCII or UNICODE strings contained within a program. Strings can also be searched for using a hex editors by loading the binary or object code file and utilizing native search functions such as regular expressions.\n Additionally, sensitive numeric values can occur within an executable. This can be used to discover the location of cryptographic constants.",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "vulnerability"
}
],
"labels": [
"misp:name=\"attack-pattern\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "capec",
"external_id": "CAPEC-191"
}
],
"x_misp_prerequisites": "Access to a binary or executable such that it can be analyzed by various utilities.",
"x_misp_related_weakness": "CWE-798"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--57c782b3-52c9-4b2a-9519-99df90a7ee63",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"target_ref": "vulnerability--8f057a13-41e4-4e2f-ade8-19802a62f278"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--d49a9675-d0bf-4c42-aa91-cac30dc8ee21",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"relationship_type": "weakened-by",
"source_ref": "vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"target_ref": "x-misp-object--25eafc23-5529-4c84-9cb9-13df3517f784"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--873f6481-5c44-4c4c-b835-101eb2047a5d",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"relationship_type": "targeted-by",
"source_ref": "vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"target_ref": "attack-pattern--ea5919da-346f-4b22-89c3-6dfeef61dba8"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--6b033f95-324a-4427-92d7-b38a95729117",
2024-04-05 12:15:17 +00:00
"created": "2023-12-15T08:49:07.000Z",
"modified": "2023-12-15T08:49:07.000Z",
"relationship_type": "targeted-by",
"source_ref": "vulnerability--a2a355a0-75b3-42c8-93f7-401b8566ed00",
"target_ref": "attack-pattern--5d27dada-7e8c-45bf-8237-e2acf772667b"
},
2023-12-14 14:30:15 +00:00
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}