¾Ýͳ¼Æ2019ÄêÃÀ¹úÒÑÓжà´ï500ËùѧУÔâÀÕË÷Èí¼þ¹¥»÷£»Ñо¿ÍŶÓÐû²¼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼
Ðû²¼Ê±¼ä 2019-09-25
Æ¾Ö¤ÔÆÇå¾²¹«Ë¾ArmorµÄµ÷ÑУ¬ÃÀ¹úÒÑÓÐ49¸öÑ§ÇøµÄ½ÌÓý»ú¹¹Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬Ê¹µÃ½ÌÓýÐÐÒµ³ÉΪ½ö´ÎÓڵط½Õþ¸®µÄµÚ¶þ´óÒ×Êܹ¥»÷Ä¿µÄ¡£¸Ã¹«Ë¾ÆÊÎöÁË×Ô2019Äê1ÔÂÒÔÀ´¹ûÕæ±¨µÀµÄ¹¥»÷£¬·¢Ã÷ÔÚ2019Äêǰ9¸öÔÂÒÑÓжà´ï500ËùK-12ѧУÔâµ½¹¥»÷£¬¶øÈ¥ÄêÖ»ÓÐ11ËùѧУ¡£½öÔÚ9ÔÂÖÐÑ®µÄÒ»Öܶàʱ¼äÀï¾ÍÓÐ9¸öÐÂÑ§ÇøºÍ1Ëù´óѧÊܵ½¹¥»÷£¬²¨¼°Ô¼100ËùK-12ѧУ¡£¿µÄùµÒ¸ñÖݵÄÑ§ÇøÊܵ½µÄÍþв×îΪÑÏÖØ£¬¸ÃÖݹ²ÔâÓöÁË7´Î¹¥»÷£¬º¸Ç104ËùѧУ¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/hundreds-of-us-schools-hit-by/2.ÃÀ¹ú17¼Ò¹«¹²·þÎñ»ú×é³ÉΪд¹ÂÚÔ˶¯µÄ¹¥»÷Ä¿µÄ
Proofpoint±¨¸æ³ÆÒ»¸öÓɹú¼Ò×ÊÖúµÄºÚ¿Í×éÖ¯ÔÚ4ÔÂ5ÈÕÖÁ8ÔÂ29ÈÕʱ´ú½«ÖÁÉÙ17¼ÒÃÀ¹ú¹«¹²·þÎñ»ú¹¹×÷Ϊ´¹ÂÚ¹¥»÷Ä¿µÄ¡£¸Ã¹¥»÷Ò»Á¬Á˳¤´ï5¸öÔµÄʱ¼ä£¬´¹ÂÚÓʼþµÄÄ¿µÄÊÇÏòÕâЩ»ú¹¹µÄÔ±¹¤·Ö·¢Ô¶¿ØÄ¾ÂíLookBack¡£ÏÖÔÚÉÐδ¶Ô¸Ã¹¥»÷Ô˶¯¾ÙÐÐÕýʽµÄ¹éÒò£¬µ«»ùÓÚÒ»Ð©ÖØÓõĴúÂ룬Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷Ô˶¯ÓëAPT10Óйء£LookBackÊÇÒ»¸öÓÃC++±àдµÄÔ¶¿ØÄ¾Âí£¬Æä¹¦Ð§°üÀ¨·þÎñö¾Ù¡¢Éó²éÊý¾Ý¡¢É¾³ýÎļþ¡¢Ö´ÐÐÏÂÁî¡¢½ØÈ¡ÆÁÄ»ÒÔ¼°×ÔÎÒɾ³ýµÈ¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬DeGrippoÍŶӷ¢Ã÷¹¥»÷ÕßÔÚÌᳫ´¹ÂÚ¹¥»÷֮ǰ»¹É¨ÃèÁËÄ¿µÄ»ú¹¹µÄ445¶Ë¿Ú£¨SMBÐÒ飩¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/17-us-utility-firms-targeted-by-mysterious-state-sponsored-group/3.Ñо¿ÍŶÓÐû²¼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼
ΪÁ˸üºÃµØËµÃ÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïµÄ·¸·¨Ô˶¯¼°Æä¹ØÁª£¬IntezerºÍCheck PointÑо¿Ö°Ô±ÅäºÏÐû²¼Á˶íÂÞ˹APTµØÍ¼¡£¸ÃµØÍ¼ÖÜÈ«ÐðÊöÁ˶íÂÞ˹²î±ðAPTµÄ¶ñÒâÈí¼þÑù±¾¡¢¶ñÒâÈí¼þ¼Ò×åÒÔ¼°¹¥»÷ÕßÖ®¼äµÄ¹ØÁª¡£Ñо¿Ö°Ô±¹²ÍøÂç¡¢¹éÀàºÍÆÊÎöÁË2000¶à¸ö¶ñÒâÈí¼þÑù±¾£¬²¢Æ¾Ö¤ËüÃÇÖ®¼ä¹²ÏíµÄ385ÍòÌõ´úÂë»æÖÆÁ˽ü2.2Íò¸öÅþÁ¬¡£¸ÃµØÍ¼»¹ÏÔʾ£¬Ö»¹Ü´ó´ó¶¼ºÚ¿Í×éÖ¯¶¼ÔÚ¸÷×Ô²î±ðµÄ¹¤¾ßºÍ¿ò¼ÜÖÐÖØ¸´Ê¹ÓÃ×Ô¼ºµÄ´úÂ룬µ«²î±ðµÄ×éÖ¯¼äȴûÓй²ÓôúÂ룬Õâ¿ÉÄÜÊÇΪÁË×èÖ¹¹ØÁªÌ»Â¶¡£Ñо¿Ö°Ô±»¹¹ûÕæÁ˸õØÍ¼¼°ÆäÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/09/russia-hacking-groups-map.html4.Zebrocy APTʹÓûùÓÚGolangµÄкóÃÅѬȾĿµÄ
Ñо¿Ö°Ô±ÊӲ쵽Zebrocy APTÔÚ×î½üµÄ¹¥»÷Ô˶¯ÖÐʹÓûùÓÚGolangµÄºóÃÅÇÔȡĿµÄÓû§µÄÐÅÏ¢¡£ZebrocyÓë¶íÂÞ˹·¸·¨ÍÅ»ïSednit£¨¼´APT28£©Óйء£ÔÚ¾ÓÉÒ»¶Îʱ¼äµÄÇÄÈ»ÆÚºó£¬¶à¼ÒÇå¾²¹«Ë¾µÄÑо¿Ö°Ô±ÊӲ쵽Zebrocy¹¥»÷ÕßÓÚ8ÔÂ20ÈÕ»Ö¸´Éú¶¯£¬Æä¹¥»÷Ä¿µÄÈÔÈ»ÊǶ«Å·ºÍÖÐÑǹú¼ÒµÄʹ¹ÝºÍÍâ½»²¿¡£ZebrocyµÄ×îÐÂÔ˶¯ÊÇ8ÔÂ22ÈÕÌᳫµÄ£¬Æä´¹ÂÚÓʼþµÄ¸½¼þÎĵµÄÚÈÝΪ¿Õȱ£¬µ«°üÀ¨¶ÔÔ¶³ÌpayloadµÄÒýÓᣴËÔ˶¯µÄÒ»¸öÁÁµãÊÇʹÓÃDropboxÍйܶñÒâÄ£°å-wordData.dotm¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zebrocy-infects-targets-with-new-golang-based-backdoor-via-dropbox/
5.Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÓ¡¶ÈµÄжñÒâÈí¼þATMDtrack
¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷Ò»¸öÕë¶ÔÓ¡¶ÈµÄеÄATM¶ñÒâÈí¼þATMDtrack¡£¸Ã¶ñÒâÈí¼þÓ볯ÏÊAPT×éÖ¯Lazarus APTÓйء£ATMDtrackÓÚ2018ÄêÏÄÈÕÄ©×îÏÈÔÚÓ¡¶ÈµÄÒøÐÐÍøÂçÖб»·¢Ã÷£¬¿¨°Í˹»ù³ÆÔÚ2019Äê9Ô³õÊӲ쵽Á˸öñÒâÈí¼þµÄ×îй¥»÷Ô˶¯¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§°üÀ¨¼üÅ̼ͼ¡¢¼ìË÷ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÍøÂçIPµØµã¼°Ô˶¯µÄÍøÂçÅþÁ¬¡¢Àú³Ìö¾Ù¡¢Îļþö¾ÙµÈ¡£¿¨°Í˹»ùÔÚ±¨¸æÖÐÁгöÁ˸ù¥»÷µÄIoCµÈÊÖÒÕϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91643/malware/north-korea-atmdtrack-malware.html
6.Ñо¿Ö°Ô±Åû¶vBulletinÖеÄδÐÞ²¹0day¼°PoC
һλÄäÃûÇå¾²Ñо¿Ö°Ô±ÔÚÊܽӴýµÄÂÛ̳Èí¼þvBulletinÖз¢Ã÷δÐÞ²¹µÄ0day²¢Åû¶ÁËÏà¹ØPoC¡£Æ¾Ö¤¶ÔÒÑÐû²¼´úÂëµÄÆÊÎö£¬¸Ã0dayÔÊÐí¹¥»÷ÕßÔÚÔËÐÐvBulletinʵÀýµÄ·þÎñÆ÷ÉÏÖ´ÐÐShellÏÂÁî¶øÎÞÐè¾ßÓÐÄ¿µÄÂÛ̳µÄÕË»§¡£ÕâÖÖÎó²î±»³ÆÎª¡°Ô¤Éí·ÝÑéÖ¤Ô¶³Ì´úÂëÖ´ÐС±Îó²î£¬ºÃÐÂÎÅÊÇ£¬¸ÃÎó²îÖ»Ó°ÏìÁËvBulletin°æ±¾5.0.0µ½×îеÄ5.5.4¡£ÓÉÓÚvBulletin±»Áè¼Ý10Íò¸öÔÚÏßÍøÕ¾ËùʹÓã¬Òò´Ë¸ÃÎó²îµÄDZÔÚÓ°Ïì¹æÄ£¼«´ó£¬vBulletin¿ª·¢ÍŶÓÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91689/hacking/unpatched-critical-0-day-vbulletin.html


¾©¹«Íø°²±¸11010802024551ºÅ