LockBit 3.0 Ransomware Victim: chasc[.]org
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Score: 10 MALWARE FAMILY: coperTAGS:family:coper, family:octo, banker, evasion, infostealer, ransomware, rat, trojanMD5: 49f67ec7bcfd5d8b01c1fb92820481f5SHA1: 19bf5e03023516b25bd2d0747773186911bdbf2fANALYSIS DATE: 2023-07-07T08:10:51ZTTPS: ScoreMeaningExample10Known badA malware family...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: e7e442f7f42d61cdebfddc801f4b03dcSHA1: 3b16dbc84446cb30963b4886600b16b4cb545dd7ANALYSIS DATE: 2023-07-07T08:35:42ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...
Score: 10 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 99a4a7145a78577d18ab6547210e5fecSHA1: 20374dec61f839f1392bab96fc8e71f0e18ff334ANALYSIS DATE: 2023-07-07T06:25:15ZTTPS: T1005, T1081, T1012 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...
Score: 8 MALWARE FAMILY: bankerTAGS:banker, evasion, ransomwareMD5: 3e7f87ff8fba7c78349284a6f4b9838bSHA1: 7d3f3b9cf7834b490f4ebfd7b714de5ba7ac67cbANALYSIS DATE: 2023-07-07T06:43:06ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:4.4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Netman-204 cross-site request forgeryPlatforms Affected:Riello Netman-204 02.05Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Netman-204 is vulnerable to cross-site request forgery, caused by improper validation...
NAME__________1panel container repositories command executionPlatforms Affected:1Panel 1Panel 1.3.5Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________1panel could allow a remote authenticated attacker to execute arbitrary...
NAME__________Samsung Pass security bypassPlatforms Affected:Samsung PassRisk Level:6.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Pass could allow a physically proximate attacker to obtain sensitive information,...
NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:4.4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Pass information disclosurePlatforms Affected:Samsung PassRisk Level:4.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Pass could allow a physically proximate attacker to obtain sensitive information,...
NAME__________Samsung Smart Switch for Windows denial of servicePlatforms Affected:Samsung Smart Switch for WindowsRisk Level:6.8Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Samsung Smart Switch for...
NAME__________Samsung Mobile devices code executionPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:5.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Pass information disclosurePlatforms Affected:Samsung PassRisk Level:6.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Pass could allow a local attacker to obtain sensitive information, caused...
NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could...
NAME__________1panel container terminal command executionPlatforms Affected:1Panel 1Panel 1.3.5Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________1panel could allow a remote authenticated attacker to execute arbitrary...
NAME__________Samsung Mobile devices information disclosurePlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:6.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:6.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Internet security bypassPlatforms Affected:Samsung InternetRisk Level:6.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Internet could allow a remote attacker to bypass security restrictions, caused...
NAME__________Samsung Mobile devices code executionPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Samsung Mobile devices could...
NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung R 11 Samsung S 12 Samsung T 13Risk Level:6.2Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could...