Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 195.133.88.76Malicious

IP Address: 195.133.88.76Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Download File Service Configuration Successful SSH Login DNS Query SFTP 2 Shell Commands SSH Scheduled Task Creation System File Modification Download and Allow Execution

Associated Attack Servers

archive.ubuntu.com github.com security.ubuntu.com

Basic Information

IP Address

195.133.88.76

Domain

-

ISP

-

Country

Czechia

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2024-01-10

Last seen in Akamai Guardicore Segmentation

2024-01-10

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: White List

Successful SSH Login

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: Correct Password 2 times

Successful SSH Login

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: Correct Password

Successful SSH Login

/root/ip.list was downloaded 3 times

Download File

/root/VAprox.sh was downloaded

Download File

System file /etc/sedocWQHa was modified 9 times

System File Modification

The file /etc/sedocWQHa was downloaded and granted execution privileges

System file /etc/seddXzhle was modified 9 times

System File Modification

The file /etc/seddXzhle was downloaded and granted execution privileges

The file /etc/sedq9PLLg was downloaded and granted execution privileges

Download and Allow Execution

System file /etc/startproxy.sh was modified 4 times

System File Modification

The file /etc/startproxy.sh was downloaded and granted execution privileges

Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.security.ubuntu.com and security.ubuntu.com

DNS Query

Process /usr/bin/apt-get attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com

DNS Query

Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com

DNS Query

Process /usr/bin/wget attempted to access domains: github.com

DNS Query

Connection was closed due to timeout

Associated Files

/root/VAprox.sh

SHA256: eda40ca6d202f9a030fbd7f61132f0a2b6c117d02e9beb37689c24a79863e43c

12503 bytes