CVE-2017-11774

Vulnerability updated 4 months ago (2024-05-04T20:48:19.377Z)
Download STIX
Preview STIX
Not enough context has been learned about CVE-2017-11774 for a description yet. However we're tracking it as a Vulnerability profile. Vulnerability: A flaw in software design or implementation
Description last updated:
What's your take? (Question 1 of 1)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
APT33Unspecified
2
APT33, an Iran-linked threat actor also known as Peach Sandstorm, Holmium, Elfin, Refined Kitten, and Magic Hound, has been involved in a series of cyber espionage activities targeting various sectors. The group's primary targets include the government, defense, satellite, oil, and gas sectors in th
HOLMIUMUnspecified
2
Holmium, also known as Curious Serpens, Peach Sandstorm, APT33, Elfin, MAGNALIUM, or REFINED KITTEN, is a threat actor that has been active since 2013. This group is responsible for executing malicious activities with the intent of breaching security and conducting cyber espionage. The group is link
Source Document References
Information about the CVE-2017-11774 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
18 days ago
Iran-linked APT33 adds new Tickler malware to its arsenal
Securityaffairs
9 months ago
APT33 targets Defense Industrial Base sector with FalseFont
Securityaffairs
a year ago
Iranian Peach Sandstorm group behind recent password spray attacks - Security Affairs
MITRE
2 years ago
Inside Microsoft 365 Defender: Mapping attack chains from cloud to endpoint - Microsoft Security Blog
MITRE
2 years ago
OVERRULED: Containing a Potentially Destructive Adversary | Mandiant