[Intel]: https://www.crowdstrike.com/blog/prophet-spider-exploits-oracle-weblogic-to-facilitate-ransomware-activity/ #373
Labels
missing:tag:Auditd
missing:tag:Non-persistentStorage
missing:tag:T1001
missing:tag:T1021.002
missing:tag:T1048
missing:tag:T1057
missing:tag:T1070.004
missing:tag:T1071.001
missing:tag:T1071.004
missing:tag:T1098.004
missing:tag:T1491
missing:tag:T1546.004
missing:tag:T1552.004
missing:tag:T1562.001
missing:tag:T1567
missing:tag:T1573
missing:tag:T1590
Area
Malware reports
Parent threat
Initial Access, Persistence, Impact
Finding
https://www.crowdstrike.com/blog/prophet-spider-exploits-oracle-weblogic-to-facilitate-ransomware-activity/
Industry reference
attack:T1190:Exploit Public-Facing Application
attack:T1505.003:Web Shell
Malware reference
No response
Actor reference
Prophet Spider
Component
Linux
Scenario
No response
The text was updated successfully, but these errors were encountered: