ʱ¼ä£º2022-01-28
2022.01.20~01.27
¹¥»÷ÍÅ»ïÇ鱨
¼ÙÆìorÉý¼¶£¿£¿£¿£¿£¿£¿£¿ÒÉËÆº£Á«»¨Ê¹ÓÃGlitchƽ̨µÄ¹¥»÷Ñù±¾ÔÙÏÖ
MoleratsAPTÕë¶ÔÖж«Óû§µÄÐÂÌØ¹¤¹¥»÷
APT36×éÖ¯¹¥»÷Á´ºÍ¶ñÒâÈí¼þÎäÆ÷¿âÆÊÎö
ÒÉËÆAPT28ʹÓÃCVE-2021-40444Õë¶Ô¸ß¼¶Õþ¸®¹ÙÔ±µÄÌØ¹¤Ô˶¯
¹¥»÷Ðж¯»òÊÂÎñÇ鱨
ð³äº½Ô˹«Ë¾·Ö·¢STRRATµÄ´¹ÂÚÔ˶¯
¹¥»÷ÕßÀÄÓùȸè±êÇ©ÖÎÀíÆ÷ÌᳫWebSkimming¹¥»÷
AnomalousÌØ¹¤Èí¼þÔ˶¯ÇÔÈ¡¹¤Òµ¹«Ë¾Æ¾Ö¤
¶ñÒâ´úÂëÇ鱨
LockBitÀÕË÷Èí¼þÕë¶ÔESXiµÄбäÖÖÆÊÎö
WhisperGateºÍNotPetya¶ñÒâÈí¼þ±£´æÏàËÆÖ®´¦
Android¶ñÒâÈí¼þBRATAµÄбäÌå
Îó²îÇ鱨
Log4jÎó²îÖØÏÖ£ºVMWareHorizonЧÀÍÆ÷ÃæÁÙ¹¥»÷Σº¦
ʹÓÃCWPµÄÎļþ°üÀ¨ºÍí§ÒâдÈëÎó²î¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐÐ
¹¥»÷ÍÅ»ïÇ鱨
01
¼ÙÆìorÉý¼¶£¿£¿£¿£¿£¿£¿£¿ÒÉËÆº£Á«»¨Ê¹ÓÃGlitchƽ̨µÄ¹¥»÷Ñù±¾ÔÙÏÖ
Åû¶ʱ¼ä£º2022Äê01ÔÂ20ÈÕ
Ç鱨ȪԴ£ºhttps://mp.weixin.qq.com/s/1L7o1C-aGlMBAXzHqR9udA
Ïà¹ØÐÅÏ¢£º
Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ºìÓêµÎÑо¿Ö°Ô±Ò»Ö±Ò»Á¬¹Ø×¢APT×éÖ¯º£Á«»¨£¨OceanLotus£©µÄÏà¹Ø¶¯Ì¬£¬£¬£¬£¬£¬£¬½üÆÚNetskopeÐû²¼ÁËһƪ¹ØÓÚmhtÃûÌÃÎļþ£¨Web¹éµµÎļþ£©Í¨¹ýЯ´øµÄOfficeºêÖ²Èë¶ñÒâÈí¼þµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬ÓÉÓÚÆäÖÐÌá¼°µÄÑù±¾½ÓÄɵĹ¥»÷ÊÖ·¨Ó뺣Á«»¨×éÖ¯±£´æÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬±¨¸æÒÔΪ´Ë´Î¹¥»÷Ô˶¯ÊǺ£Á«»¨×éÖ¯ËùΪ¡£¡£¡£¡£¡£¡£¡£ÉîÈëÆÊÎöºó·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Á÷³ÌÖб£´æÒ»Ð©²î±ðÓÚº£Á«»¨¹ýÍù¹¥»÷Ô˶¯µÄÌØµã£¬£¬£¬£¬£¬£¬Òò´Ë²»É¨³ýÆäËû¹¥»÷ÍÅ»ïÄ£Ä⺣Á«»¨µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»£»ùÓÚÏÖÓеĹûÕæÐÅÏ¢£¬£¬£¬£¬£¬£¬ÔÝʱ»¹²»¿ÉÈ·¶¨´Ë´Î¹¥»÷Ô˶¯±³ºóÍÅ»ïµÄÏêϸÉí·Ý¡£¡£¡£¡£¡£¡£¡£
´ËÀàÑù±¾Ê¹ÓÃGlitchƽ̨·Ö·¢¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¹¥»÷ʱºê´úÂë»áƾ֤ϵͳ°æ±¾ÊÍ·Å32λ»ò64λ¶ñÒâDLL£¬£¬£¬£¬£¬£¬ÊͷŶñÒâDLLʱ»á²åÈëÒ»¶ÎËæ»úÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¶ñÒâDLL½«ÍøÂçµÄÐÅÏ¢»Ø´«¸øGlitchƽ̨ÍйܵÄC2ЧÀÍ£¬£¬£¬£¬£¬£¬È»ºóÏÂÔØ¾ÓÉ7zѹËõµÄºóÐø¶ñÒâÈí¼þ²¢Ö´ÐС£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¶Ôºê´úÂëºÍ¶ñÒâDLL¾ù¾ÙÐÐÁË´úÂë»ìÏý¡£¡£¡£¡£¡£¡£¡£

02
MoleratsAPTÕë¶ÔÖж«Óû§µÄÐÂÌØ¹¤¹¥»÷
Åû¶ʱ¼ä£º2022Äê01ÔÂ20ÈÕ
Ç鱨ȪԴ£ºhttps://www.zscaler.com/blogs/security-research/new-espionage-attack-molerats-apt-targeting-users-middle-east
Ïà¹ØÐÅÏ¢£º
¿ËÈÕ£¬£¬£¬£¬£¬£¬ZscalerÑо¿Ö°Ô±Åû¶ÁËMoleratsÍÅ»ïÕë¶ÔÖж«µØÇøµÄÌØ¹¤Ô˶¯¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¹¥»÷´Ó2021Äê7Ô¾ÍÒÑ×îÏÈ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÕýµ±µÄÔÆÐ§ÀÍ£¨ÈçGoogleDriveºÍDropbox£©ÍйܶñÒâÈí¼þpayload£¬£¬£¬£¬£¬£¬´ÓÖж«µØÇøµÄÄ¿µÄÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÔ˶¯Ê¹ÓÃÓëÒÔÉ«ÁкͰÍÀÕ˹̹³åÍ»Ïà¹ØµÄÓÕ¶ü£¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄϵͳÉÏ×°ÖÃ.NETºóÃÅ£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄ°üÀ¨°ÍÀÕË¹Ì¹ÒøÐÐÒµÔ±¹¤¡¢°ÍÀÕ˹̹Õþµ³³ÉÔ±£¬£¬£¬£¬£¬£¬ÒÔ¼°ÍÁ¶úÆä¼ÇÕߵȡ£¡£¡£¡£¡£¡£¡£

03
APT36×éÖ¯¹¥»÷Á´ºÍ¶ñÒâÈí¼þÎäÆ÷¿âÆÊÎö
Åû¶ʱ¼ä£º2022Äê01ÔÂ24ÈÕ
Ç鱨ȪԴ£ºhttps://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html
Ïà¹ØÐÅÏ¢£º
APT36ÊÇÒ»¸ö¾ßÓÐÕþÖÎÄîÍ·µÄAPT×éÖ¯£¬£¬£¬£¬£¬£¬ÒÔÓ¡¶È¾üʺÍÍâ½»×ÊԴΪĿµÄ¡£¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¸Ã×é֯ʹÓÃCapraRAT¡¢CrimsonRAT¡¢ObliqueRat¾ÙÐжñÒâÔ˶¯¡£¡£¡£¡£¡£¡£¡£Í¨³£ÇéÐÎÏ£¬£¬£¬£¬£¬£¬´Ë×éÖ¯¾³£ÒÔÉç»á¹¤³ÌºÍÍøÂç´¹ÂÚ×÷ΪÇÐÈëµã£¬£¬£¬£¬£¬£¬È»ºó°²ÅŶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬´ÓÊܺ¦ÕßÄÇÀïÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ë´ÎÔ˶¯ÖУ¬£¬£¬£¬£¬£¬´Ë×é֯ʹÓÃÓã²æÊ½´¹ÂÚÓʼþºÍÒ»¸öUSBÈä³æÍ¶·ÅºÍÖ´ÐÐÔ¶³Ì»á¼ûľÂí£¨RAT£©¡£¡£¡£¡£¡£¡£¡£¶ñÒâÓʼþÒÔÖÖÖÖÓÕ¶üÀ´ÓÕÆÊܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨Ú²ÆÐÔµÄÕþ¸®Îļþ¡¢ÏÔʾÃÔÈËÅ®ÐÔ×ÊÁϵÄÃÛÌÇÏÝÚ壬£¬£¬£¬£¬£¬ÒÔ¼°Óë×î½ü¹Ú×´²¡¶¾ÓйصÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
Ò»µ©Êܺ¦ÕßÏÂÔØÁ˶ñÒâºê£¬£¬£¬£¬£¬£¬Ëü½«½âÃÜÒ»¸öÒþ²ØÔÚÎı¾¿òÄÚµÄǶÈëʽ¿ÉÖ´ÐгÌÐò£¬£¬£¬£¬£¬£¬ÔÚÖ´ÐÐ֮ǰ£¬£¬£¬£¬£¬£¬´Ë¶ñÒâºê»á±»ÉúÑĵ½Ò»¸öÓ²±àÂëµÄ·¾¶¡£¡£¡£¡£¡£¡£¡£Ò»µ©¿ÉÖ´ÐÐÎļþ±»Ö´ÐУ¬£¬£¬£¬£¬£¬Ëü½«¼ÌÐø½âѹËõÒ»¸öÃûΪmdkhm.zipµÄÎļþ£¬£¬£¬£¬£¬£¬È»ºóÖ´ÐÐÒ»¸öÃûΪdlrarhsiva.exeµÄCrimsonRAT¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÔ˶¯ÖÐʹÓÃCrimsonRAT¶ñÒâÈí¼þÓëC&CЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬ÒÔÏÂÔØÆäËû¶ñÒâÈí¼þ»òÉøÍ¸Êý¾Ý¡£¡£¡£¡£¡£¡£¡£CrimsonRAT¿ÉÒÔ´Óä¯ÀÀÆ÷ÖÐÇÔȡƾ֤£¬£¬£¬£¬£¬£¬ÍøÂç·À²¡¶¾ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¶»ñÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬²¢ÁгöÊܺ¦ÕßµÄÇý¶¯Æ÷¡¢Àú³ÌºÍĿ¼¡£¡£¡£¡£¡£¡£¡£

³ýÁËCrimsonRAT¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬´Ë×éÖ¯ÔÚÔ˶¯Öл¹»áʹÓÃObliqueRat¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦Õßµã»÷ÓÕ¶üÁ´½Ó£¬£¬£¬£¬£¬£¬»áÏÂÔØÒ»¸ö´øÓжñÒâºêµÄÎļþ¡£¡£¡£¡£¡£¡£¡£ÆôÓøúêºó£¬£¬£¬£¬£¬£¬Ëü½«ÏÂÔØÒþ²ØÔÚͼÏñÎļþÖеÄObliqueRat¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÎļþÖеĺ꽫ÏÂÔØÒ»¸öÒþ²ØObliqueRAT¶ñÒâÈí¼þµÄλͼͼÏñ£¨BMP£©Îļþ£¬£¬£¬£¬£¬£¬¶ÔÏÂÔØµÄBMPÎļþ¾ÙÐнâÂ룬£¬£¬£¬£¬£¬È»ºóͨ¹ý½¨ÉèÒ»¸ö×Ô¶¯ÔËÐÐObliqueRATµÄURLÀ´¼á³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±´Ë×éÖ¯»¹»áʹÓÃCapraRAT£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâÍøÂç´¹ÂÚÁ´½Ó°²ÅÅ£¬£¬£¬£¬£¬£¬ÓëCrimsonRatµÄ¹¦Ð§ÀàËÆ¡£¡£¡£¡£¡£¡£¡£

04
ÒÉËÆAPT28ʹÓÃCVE-2021-40444Õë¶Ô¸ß¼¶Õþ¸®¹ÙÔ±µÄÌØ¹¤Ô˶¯
Åû¶ʱ¼ä£º2022Äê01ÔÂ25ÈÕ
Ç鱨ȪԴ£ºhttps://www.trellix.com/en-us/about/newsroom/stories/threat-labs/prime-ministers-office-compromised.html
Ïà¹ØÐÅÏ¢£º
¿ËÈÕ£¬£¬£¬£¬£¬£¬TrellixÈ·¶¨ÁËÒ»Ïî¶à½×¶ÎÌØ¹¤Ô˶¯£¬£¬£¬£¬£¬£¬Ä¿µÄÊÇÈÏÕæ¹ú¼ÒÇå¾²Õþ²ßµÄ¸ß¼¶Õþ¸®¹ÙÔ±ºÍÎ÷Ñǹú·À¹¤ÒµµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¡£
ѬȾÁ´Ê¼ÓÚExcelÏÂÔØ³ÌÐòµÄÖ´ÐУ¬£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÊÇͨ¹ýµç×ÓÓʼþ·¢Ë͸øÊܺ¦Õߵ쬣¬£¬£¬£¬£¬¸Ã³ÌÐòʹÓÃMSHTMLÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-40444£©ÔÚÄÚ´æÖÐÖ´ÐжñÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʹÓõĶñÒâÈí¼þ±»Ñо¿Ö°Ô±ÃüÃûΪGraphite£¬£¬£¬£¬£¬£¬Ëü»ùÓÚOneDriveEmpireStager£¬£¬£¬£¬£¬£¬Í¨¹ýMicrosoftGraphAPI½«OneDriveÕË»§ÓÃ×÷ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¶à½×¶Î¹¥»÷±»ÒÔΪÓëAPT×éÖ¯Óйأ¬£¬£¬£¬£¬£¬¾¶ñÒâÈí¼þµÄ´úÂë¿éºÍÐòÁÐÆ¥Å䣬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¸Ã¶ñÒâ´úÂëÓë2018ÄêAPT28µÄÑùÄÚÇéËÆ¶È½Ï¸ß£¬£¬£¬£¬£¬£¬ÒÉËÆÎªAPT28µÄ¹¥»÷ÎäÆ÷¡£¡£¡£¡£¡£¡£¡£

¹¥»÷Ðж¯»òÊÂÎñÇ鱨
01
ð³äº½Ô˹«Ë¾·Ö·¢STRRATµÄ´¹ÂÚÔ˶¯
Åû¶ʱ¼ä£º2022Äê01ÔÂ20ÈÕ
Ç鱨ȪԴ£ºhttps://www.fortinet.com/blog/threat-research/new-strrat-rat-phishing-campaign
Ïà¹ØÐÅÏ¢£º
FortinetÅû¶ÁË·Ö·¢Ô¶³Ì»á¼ûľÂíSTRRATµÄ´¹ÂÚÔ˶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÔ˶¯Ã°³äº½Ô˹«Ë¾ÂíÊ¿»ùº½Ô˹«Ë¾£¨MaerskShipping£©£¬£¬£¬£¬£¬£¬Ê¹ÓÃÒÔ×°ÔË¡¢½»»õÈÕÆÚ¸ü¸Ä»ò¹ºÖÃ֪ͨµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬µ±Ä¿µÄ·¿ªÓʼþÖеĸ½¼þºó¾Í»áÔËÐжñÒâºê²¢×°ÖÃSTRRAT¡£¡£¡£¡£¡£¡£¡£STRRAT¿ÉÒÔÇÔȡĿµÄµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬»òÕß¾ÙÐмٵÄÀÕË÷¹¥»÷£¨ÔÚ¹¥»÷ÖÐûÓÐÎļþ±»¼ÓÃÜ£©¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËAllatori¹¤¾ß¶ÔÈí¼þ°ü¾ÙÐÐÁË»ìÏý£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ýÇå¾²²úÆ·µÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£
02
¹¥»÷ÕßÀÄÓùȸè±êÇ©ÖÎÀíÆ÷ÌᳫWebSkimming¹¥»÷
Åû¶ʱ¼ä£º2022Äê01ÔÂ24ÈÕ
Ç鱨ȪԴ£ºhttps://decoded.avast.io/pavlinakopecka/web-skimming-attacks-using-google-tag-manager/
Ïà¹ØÐÅÏ¢£º
AvastÇå¾²Ö°Ô±·¢Ã÷ÁËһϵÁдÓ2021Äê3Ôµ½ÏÖÔÚÒ»Á¬»îÔ¾µÄWebSkimming¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÀÄÓÃÁ˹ȸè±êÇ©ÖÎÀíÆ÷£¨GTM£©£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°¢¸ùÍ¢ºÍÉ³ÌØ°¢À²®µÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£
¹¥»÷ÕßʹÓÃGTM×÷ΪWebSkimming¹¥»÷µÄµÚÒ»½×¶Î¡£¡£¡£¡£¡£¡£¡£Ê×ÏÈ£¬£¬£¬£¬£¬£¬ÊÜѬȾµÄÍøÒ³´ÓHTMLÎļþÖмÓÔØGTMÓòϵľ籾¡£¡£¡£¡£¡£¡£¡£ÏÖʵÉÏÐí¶àÍøÕ¾¶¼»áʹÓÃGTM£¬£¬£¬£¬£¬£¬¿ÉÊǹ¥»÷ÕßʹÓÃGTM¾ç±¾¿ÉÌí¼Ó×Ô½ç˵¾ç±¾µÄÌØµã£¬£¬£¬£¬£¬£¬Ìí¼ÓÁË×Ô½ç˵µÄ¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬´Ó¶ø¼ÓÔØÁíÒ»¸öjavascriptÎļþ¡£¡£¡£¡£¡£¡£¡£WebSkimming¹¥»÷µÄµÚ¶þ½×¶ÎÊǼÓÔØÃûΪfaviconµÄ¶ñÒâ¸ºÔØ£¬£¬£¬£¬£¬£¬¸Ã¸ºÔذüÀ¨400ÐлìÏý´¦Öóͷ£µÄjs´úÂ룬£¬£¬£¬£¬£¬»áͨ¹ýWebSocketsÏÂÔØ×îÖս׶θºÔØ¡£¡£¡£¡£¡£¡£¡£×îÖյĸºÔØÓÐÔ¼1000ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬¹¦Ð§ÎªÇÔÈ¡Óû§ÉúÒâµÄÖ§¸¶ÏêÇé¡£¡£¡£¡£¡£¡£¡£

03
AnomalousÌØ¹¤Èí¼þÔ˶¯ÇÔÈ¡¹¤Òµ¹«Ë¾Æ¾Ö¤
Åû¶ʱ¼ä£º2022Äê01ÔÂ19ÈÕ
Ç鱨ȪԴ£ºhttps://securelist.com/hunt-for-corporate-credentials-on-ics-networks/105545/
Ïà¹ØÐÅÏ¢£º
Ñо¿Ö°Ô±·¢Ã÷Á˼¸ÏîÕë¶Ô¹¤ÒµÆóÒµµÄÌØ¹¤Èí¼þÔ˶¯£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ¼ÔÚÇÔÈ¡µç×ÓÓʼþÕË»§Æ¾Ö¤£¬£¬£¬£¬£¬£¬²¢¾ÙÐвÆÎñÚ²ÆÔ˶¯»ò½«ÆäתÊÛ¸øÆäËûÍþвÕß¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÖÐʹÓõÄÉÌÆ·¶ñÒâÈí¼þ°üÀ¨AgentTesla¡¢HawkEye¡¢Noon/Formbook¡¢Masslogger¡¢SnakeKeylogger¡¢AzorultºÍLokibot¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«ÕâÐ©ÌØ¹¤Èí¼þ¹¥»÷³ÆÎªAnomalous¡£¡£¡£¡£¡£¡£¡£
¹¥»÷ÕßʹÓÃͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚ»ñµÃµÄƾ֤ÉîÈëÉøÍ¸²¢ÔÚ¹«Ë¾ÍøÂçÖкáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ËûÃǽ«ÔÚÏÈǰ¹¥»÷ÖÐÊÜËðµÄÆóÒµÓÊÏäÓÃ×÷й¥»÷µÄC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÕâʹµÃ¶ñÒâÄÚ²¿Í¨Ñ¶µÄ¼ì²âºÍ±ê¼ÇºÜÊǾßÓÐÌôÕ½ÐÔ¡£¡£¡£¡£¡£¡£¡£
ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐ2,000¸öÆóÒµµç×ÓÓʼþÕË»§±»ÀÄÓÃΪÔÝʱC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÉÐÓÐ7,000¸öµç×ÓÓʼþÕË»§ÒÔÆäËû·½·¨±»ÀÄÓᣡ£¡£¡£¡£¡£¡£ÔÚÕâЩÔ˶¯Öб»µÁµÄµç×ÓÓʼþRDP¡¢SMTP¡¢SSH¡¢cPanelºÍVPNÕË»§Æ¾Ö¤¶¼Ðû²¼ÔÚ°µÍøÊг¡ÉÏ£¬£¬£¬£¬£¬£¬²¢×îÖÕ³öÊÛ¸øÆäËûÍþв¼ÓÈëÕß¡£¡£¡£¡£¡£¡£¡£ÔÚÕâЩ²»·¨Êг¡³öÊÛµÄRDPÕË»§ÖУ¬£¬£¬£¬£¬£¬Ô¼ÓÐ3.9%ÊôÓÚ¹¤Òµ¹«Ë¾¡£¡£¡£¡£¡£¡£¡£

¶ñÒâ´úÂëÇ鱨
01
LockBitÀÕË÷Èí¼þÕë¶ÔESXiµÄбäÖÖÆÊÎö
Åû¶ʱ¼ä£º2022Äê01ÔÂ24ÈÕ
Ç鱨ȪԴ£ºhttps://www.trendmicro.com/en_us/research/22/a/analysis-and-Impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
Ïà¹ØÐÅÏ¢£º
×Ô2021Äê10ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼×îÏÈÔÚÒ°²¶»ñµ½LockBitÀÕË÷Èí¼þµÄ±äÖÖÑù±¾LockbitLinux-ESXiLockerversion1.0¡£¡£¡£¡£¡£¡£¡£¸ÃÀàÑù±¾½ÓÄÉAESºÍECCÁ½ÖÖ¼ÓÃÜËã·¨¾ÙÐÐÊý¾Ý¼ÓÃÜ£¬£¬£¬£¬£¬£¬ÇÒÔÚÔËÐÐʱ¿ÉÒÔÖ¸¶¨¶àÖÖ²ÎÊý¡£¡£¡£¡£¡£¡£¡£ÆäÈÕÖ¾¹¦Ð§¿ÉÒÔÍøÂç¼Í¼´¦Öóͷ£Æ÷ÐÅÏ¢¡¢¼ÓÃÜʱ³¤¡¢¼ÓÃÜÎļþ¾ÞϸµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ»¹°üÀ¨¶ÔESXiЧÀÍÆ÷ÉϵÄÐéÄâ»ú¾µÏñ¾ÙÐмÓÃÜËù±ØÐèµÄÏÂÁî¡£¡£¡£¡£¡£¡£¡£
ÕâÒ»±äÖÖ°æ±¾µÄ·¢Ã÷ÇкÏÄ¿½ñÀÕË÷Èí¼þ×éÖ¯×ªÒÆÖØÐĵ½¼ÓÃÜESXiЧÀÍÆ÷µÈLinuxÖ÷»úµÄ×ö·¨¡£¡£¡£¡£¡£¡£¡£ESXiЧÀÍÆ÷ͨ³£³ÐÔØ¶à¸öÐéÄâ»ú£¬£¬£¬£¬£¬£¬ÕâЩÐéÄâ»úÓÖ³ÐÔØ×Å×éÖ¯µÄÖ÷ÒªÊý¾Ý»òЧÀÍ¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬Õë¶ÔESXiЧÀÍÆ÷µÄÀÕË÷Èí¼þ¿ÉÄÜ»á¶ÔÄ¿µÄ¹«Ë¾±¬·¢¸ü´óÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÕâÒ»Ç÷ÊÆÊÇÓÉREvilºÍDarkSideµÈÀÕË÷Èí¼þ¼Ò×åËùÒýÁìµÄ¡£¡£¡£¡£¡£¡£¡£
02
WhisperGateºÍNotPetya¶ñÒâÈí¼þ±£´æÏàËÆÖ®´¦
Åû¶ʱ¼ä£º2022Äê01ÔÂ21ÈÕ
Ç鱨ȪԴ£ºhttps://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html
Ïà¹ØÐÅÏ¢£º
1ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÔÚÕë¶ÔÎÚ¿ËÀ¼µÄ´ó¹æÄ£¹¥»÷Ô˶¯Öмì²âµ½Ò»ÖÖÐÂÐÍÆÆËðÐÔ¶ñÒâÈí¼þ“WhisperGate”£¬£¬£¬£¬£¬£¬²¢½«¹¥»÷»îÐж¯ÎªDEV-0586¾ÙÐиú×Ù¡£¡£¡£¡£¡£¡£¡£WhisperGate¶ñÒâÈí¼þαװ³ÉÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬µ«Æä¹¥»÷Ä¿µÄ²»ÊÇΪÁ˾¼Ã»ñÒæ£¬£¬£¬£¬£¬£¬¶øÊÇΪÁËÆÆËðÊܺ¦ÕßÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÔ˶¯ÖÐʹÓÃÁ˱»µÁƾ֤£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚÉøÍ¸±¬·¢Ç°¼¸¸öÔ¾ͻá¼ûÁËһЩÊܺ¦ÕßÍøÂ磬£¬£¬£¬£¬£¬ÕâÊÇÖØ´óAPT¹¥»÷µÄµä·¶ÌØÕ÷¡£¡£¡£¡£¡£¡£¡£
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬TalosÑо¿Ö°Ô±Ðû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬WhisperGate¶ñÒâÈí¼þÓë2017Äê¹¥»÷ÎÚ¿ËÀ¼ÊµÌåµÄNotPetyaWiperÓÐһЩÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬°üÀ¨Î±×°³ÉÀÕË÷Èí¼þÒÔ¼°Õë¶ÔºÍÆÆËðÖ÷Ö¸µ¼¼Í¼(MBR)¶ø²»ÊÇ¶ÔÆä¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬µ«WhisperGate¾ßÓиü¶à¶ñÒâ×é¼þ¡£¡£¡£¡£¡£¡£¡£
03
Android¶ñÒâÈí¼þBRATAµÄбäÌå
Åû¶ʱ¼ä£º2022Äê01ÔÂ24ÈÕ
Ç鱨ȪԴ£ºhttps://www.cleafy.com/cleafy-labs/how-brata-is-monitoring-your-bank-account
Ïà¹ØÐÅÏ¢£º
Android¶ñÒâÈí¼þBRATAÔÚÆäбäÌåÖÐÌí¼Ó¶à¸ö¹¦Ð§¡£¡£¡£¡£¡£¡£¡£BRATAÊÇÒ»¿îÖ÷ÒªÕë¶Ô°ÍÎ÷Óû§µÄAndroidRAT£¬£¬£¬£¬£¬£¬ÔÚ2019ÄêÊ״α»Kaspersky·¢Ã÷¡£¡£¡£¡£¡£¡£¡£
¸Ã±äÌåÏÖÔÚÖ÷ÒªÕë¶ÔÓ¢¹ú¡¢²¨À¼¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÖйúºÍÀ¶¡ÃÀÖ޵ĵç×ÓÒøÐеÄÓû§£¬£¬£¬£¬£¬£¬ÐÂÔöÁ˼üÅ̼ͼ¹¦Ð§¡¢GPS¸ú×Ù¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÒÔÖ´Ðгö³§ÖØÖÃÒÔɨ³ýËùÓжñÒâÔ˶¯µÄºÛ¼££¬£¬£¬£¬£¬£¬»¹Ìí¼ÓÁË¿ÉÒÔÖ§³ÖHTTPºÍWebSocketsµÄÐÂC2ͨѶͨµÀ¡£¡£¡£¡£¡£¡£¡£

Îó²îÏà¹Ø
01
Log4jÎó²îÖØÏÖ£ºVMWareHorizonЧÀÍÆ÷ÃæÁÙ¹¥»÷Σº¦
Åû¶ʱ¼ä£º2022Äê01ÔÂ20ÈÕ
Ç鱨ȪԴ£ºhttps://blog.morphisec.com/log4j-exploit-hits-again-vulnerable-vmware-horizon-servers-at-risk
Ïà¹ØÐÅÏ¢£º
2021Äê12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Log4j£¨Log4Shell£©Îó²î±»ÆØ£¬£¬£¬£¬£¬£¬ÎÞÊýµÄ×°±¸Ë²¼ä±äµÃÓб»¹¥»÷µÄΣº¦£¬£¬£¬£¬£¬£¬Log4j±»ÁÐΪÆù½ñΪֹ×îÑÏÖØµÄÎó²îÖ®Ò»¡£¡£¡£¡£¡£¡£¡£Ëæ×Ź¥»÷Õß×îÏÈʹÓÃųÈõµÄVMWareHorizonЧÀÍÆ÷£¬£¬£¬£¬£¬£¬¶ÔLog4jÇå¾²Îó²îµÄ¿Ö¾åÔٴηºÆð¡£¡£¡£¡£¡£¡£¡£
½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÒ»Ö±ÔÚɨÃèÍøÂ磬£¬£¬£¬£¬£¬Ñ°ÕÒÒ×»á¼ûµÄjavaЧÀÍ£¬£¬£¬£¬£¬£¬¶ÔÒ×ÊÜLog4jÓ°ÏìµÄ×°±¸¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬ÕâÆäÖаüÀ¨Õë¶ÔVMwareHorizonЧÀÍÆ÷µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£VMwareHorizonЧÀÍÆ÷7.xºÍ8.x°æ±¾ÈÝÒ×Êܵ½Log4jÎó²î£¨CVE-2021-44228ºÍCVE-2021-45046£©µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃTomcatЧÀÍ£¨ws_TomcatService.exe£©Ö´ÐÐpowerhell.exeÀú³Ì¡£¡£¡£¡£¡£¡£¡£È»ºóÖØÆôVMBLastSGЧÀÍ£¬£¬£¬£¬£¬£¬Æô¶¯Ò»¸öÓëC&CЧÀÍÆ÷ͨѶµÄ¼àÌýÆ÷¡£¡£¡£¡£¡£¡£¡£¸Ã¼àÌýÆ÷´ÓЧÀÍÆ÷ÉÏÔËÐаüÀ¨Ìض¨Ó²±àÂëÃÜÔ¿µÄÏÂÁî¡£¡£¡£¡£¡£¡£¡£Õâ¸öÀú³Ì±»ÓÃÀ´ÓëÖ´ÐÐÀÕË÷Èí¼þ»òÆäËû¶ñÒâÔ˶¯µÄC&CЧÀÍÆ÷½¨É賤ÆÚµÄͨѶ¡£¡£¡£¡£¡£¡£¡£
ʹÓÃCWPµÄÎļþ°üÀ¨ºÍí§ÒâдÈëÎó²î¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐÐ
Åû¶ʱ¼ä£º2022Äê01ÔÂ22ÈÕ
Ç鱨ȪԴ£ºhttps://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/
Ïà¹ØÐÅÏ¢£º
ControlWebPanelÖб£´æ2¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£¡£¡£ControlWebPanel£¨ÒÔǰµÄCentOSWebPanel£©ÊÇÒ»¸ö¿ªÔ´µÄLinux¿ØÖÆÃæ°åÈí¼þ£¬£¬£¬£¬£¬£¬ÓÃÓÚ°²ÅÅWebÍйÜÇéÐΡ£¡£¡£¡£¡£¡£¡£µÚÒ»¸öÊÇÎļþ°üÀ¨Îó²î£¨CVE-2021-45467£©£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ»ÐèÐÞ¸ÄincludeÓï¾ä¾Í¿ÉÒÔÔ¶³Ì×¢Èë¶ñÒâ´úÂë»òʵÏÖ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öΪí§ÒâÎļþдÈëÎó²î£¨CVE-2021-45466£©£¬£¬£¬£¬£¬£¬ÍŽáʹÓÃÕâÁ½¸öÎó²î¿ÉÒÔÔÚÒ×Êܹ¥»÷µÄLinuxЧÀÍÆ÷ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£
ʱ¼ä£º2026-04-22
ʱ¼ä£º2026-04-20
ʱ¼ä£º2026-04-20
ʱ¼ä£º2026-04-18
Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ