Sophos·¢Ã÷Õë¶ÔExchangeµÄÐÂÀÕË÷Èí¼þEpsilon Red£»Bellingcat³ÆÃÀ¹úÊ¿±øµÄѧϰӦÓÿÉй¶ºËÎäÆ÷ÐÅÏ¢
Ðû²¼Ê±¼ä 2021-05-311.Sophos·¢Ã÷Õë¶ÔExchangeµÄÐÂÀÕË÷Èí¼þEpsilon Red

Çå¾²¹«Ë¾Sophos·¢Ã÷ÐÂÀÕË÷Èí¼þEpsilon Red£¬Ö÷ÒªÕë¶ÔMicrosoft Exchange·þÎñÆ÷¡£Ñо¿Ö°Ô±ÔÚÊÓ²ìÕë¶ÔÃÀ¹úijÂùݵĹ¥»÷Ô˶¯Ê±·¢Ã÷µÄ¸Ã¶ñÒâÈí¼þ¡£Epsilon RedÓÃGolang£¨Go£©±àд£¬ÓÐÒ»×鯿ÒìµÄPowerShell¾ç±¾£¬ÆäÖÐÿ¸ö¾ç±¾¶¼ÓÐÌØ¶¨×÷Óã¬ÈçÖÕÖ¹Çå¾²¹¤¾ß¡¢É¾³ý¸±±¾¡¢ÇÔÈ¡Çå¾²ÕÊ»§ÖÎÀíÆ÷£¨SAM£©ÎļþµÈ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬¸ÃÍÅ»ïʹÓÃÁËREvilÊê½ð¼Í¼µÄÄ£°å£¨¾ÀÕýÁËÆäÖеÄÓï·¨ºÍƴд¹ýʧ£©£¬²¢ÇÒEpsilon RedÊÇÂþÍþÖжíÂÞ˹³¬µÈÊ¿±øµÄ½ÇÉ«Ãû£¬Òò´ËÍÆ¶Ï¸ÃÍÅ»ïÓë¶íÂÞ˹Óйء£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-epsilon-red-ransomware-hunts-unpatched-microsoft-exchange-servers/
2.Ñо¿ÍŶӷ¢Ã÷ÒÔÎÖ¶ûÂê°ü¹üÒ쳣ΪÖ÷ÌâµÄ´¹ÂÚÔ˶¯

Ñо¿ÍŶӷ¢Ã÷еĴ¹ÂÚÔ˶¯Ã°³äÎÖ¶ûÂ곬ÊС£¸ÃÔ˶¯µÄ´¹ÂÚÓʼþÒÔ¡°ÄúµÄ°ü¹üµÝËÍÒ쳣֪ͨID££¡±ÎªÖ÷Ì⣬ָ³öÓÉÓڵص㲻׼ȷÎÞ·¨Í¶µÝ°ü¹ü£¬Óû§Ðè»Ø¸´×¼È·µÄµØµã¡£µ±Óû§µã»÷¡°¸üеص㡱ʱ£¬½«»á×Ô¶¯½¨ÉèÒ»¸öÖ÷ÌâΪ¡°¸üÐÂÎҵĵص㣡¡±µÄÓʼþ£¬²¢·¢Ë͵½¹¥»÷ÕßµÄÓʼþµØµã¡£´Ë´ÎÔ˶¯ÖÐÍøÂçµ½µÄÐÅÏ¢¿ÉÓÃÓÚ¾ÙÐÐÉí·ÝµÁÓù¥»÷¡¢»á¼ûÓû§µÄÆäËûÕÊ»§»ò¾ÙÐÐÓÐÕë¶ÔÐÔµÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/beware-walmart-phishing-attack-says-your-package-was-not-delivered/
3.Bellingcat³ÆÃÀ¹úÊ¿±øµÄѧϰӦÓÿÉй¶ºËÎäÆ÷ÐÅÏ¢

Bellingcat³ÆÃÀ¹úÊ¿±øÊ¹ÓõÄÔÚÏßѧϰӦÓÿÉй¶ºËÎäÆ÷ÐÅÏ¢¡£ÈÏÕæÔÚÅ·ÖÞ±£¹ÜºËÎäÆ÷µÄÃÀ¹úÊ¿±øÐèÒªÓ°ÏóÖØ´óµÄÇ徲ϸ½ÚºÍÐÒ飬²¿·ÖÏÖÒÛְԱʹÓÃÁ˹ûÕæ¿É¼ûµÄ³éÈÏ¿¨Ñ§Ï°Ó¦Óá£ÕâЩӦÓÃй¶ÁË»ùְλÖᢿÉÄÜ×°ÓкËÎäÆ÷¼òÖ±ÇÐλÖá¢ÉãÏñ»úµÄλÖá¢Ñ²ÂߵįµÂÊÉõÖÁ½ûÇøËùÐèÒªµÄΨһ±êʶ·ûµÈ¡£Bellingcat³ÆÔÚGoogleÉÏËÑË÷¡°PAS¡±ºÍ¡°WS3¡±µÈ¾üÊÂÊõÓÔÙ¼ÓÉÏÅ·ÖÞ¿Õ¾ü»ùµØµÄÃû³Æ£¬±ã¿ÉÒÔ·¢Ã÷Ãâ·ÑµÄ³éÈÏ¿¨Æ½Ì¨£¬ÀýÈçChegg¡¢QuizletºÍCram¡£
ÔÎÄÁ´½Ó£º
https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/
4.Ñо¿Ö°Ô±ÑÝʾ¿É¸Ä¶¯ÒÑÈÏÖ¤µÄPDFÎĵµµÄй¥»÷·½·¨

Ruhr University BochumÑо¿Ö°Ô±ÑÝʾ¿É¸Ä¶¯ÒÑÈÏÖ¤µÄPDFÎĵµµÄÁ½ÖÖÐµĹ¥»÷·½·¨¡£ÕâÁ½ÖÖ¹¥»÷·½·¨±»³ÆÎªEvil Annotation Attack£¨EAA£©ºÍSneaky Signature Attack£¨SSA£©£¬¹¥»÷Õß¿ÉÒÔÐÞ¸ÄÎĵµÄÚÈݶø²»»áʹÆäÊý×ÖÊðÃûÎÞЧ¡£ÆäÖÐEAAÊÇͨ¹ý²åÈë°üÀ¨¶ñÒâ´úÂëµÄ×¢ÊÍÀ´ÐÞ¸ÄÒÑÈÏÖ¤µÄÎĵµ£¬¶øSSAÊÇͨ¹ýÏòÎĵµÖÐÌí¼ÓÁýÕÖÊðÃûµÄÔªÏòÀ´¿ØÖÆÍâ¹Û£¬ÒÔÌîд±íµ¥×ֶΡ£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/05/researchers-demonstrate-2-new-hacks-to.html
5.¼ÓÖÝAzusa¾¯¾Ö³ÆÆäѬȾÀÕË÷Èí¼þDoppelPaymer

¼ÓÀû¸£ÄáÑÇÖݵÄAzusa¾¯Ô±¾ÖѬȾDoppelPaymer£¬²¿·ÖÐÅϢй¶¡£4ÔÂ22ÈÕ£¬ºÚ¿Í¹ûÕæÁ˸ò¿·ÖµÄÐÅÏ¢£¬°üÀ¨¾¯Ô±µÄÊÓ²ì¼Í¼¡¢Ñ²ÂßÖ°Ô±±¨¸æÒÔ¼°²ÆÎñºÍн×ÊÏà¹ØµÄÐÅÏ¢£¬µ«¹¥»÷Õß²¢Ã»ÓÐÅú×¢ËûÃÇÇÔÈ¡Á˼¸´ó¶¼¾Ý¡£¸Ã²¿·ÖÔÚ5ÔÂ28ÈÕÐû²¼ÁËÉùÃ÷£¬Ö¸³ö¹¥»÷±¬·¢ÔÚ3ÔÂ9ÈÕ£¬¾¯¾ÖµÄ²¿·ÖϵͳÎÞ·¨»á¼û£¬Ö±µ½5ÔÂ20ÈÕÈ·¶¨Ð¹Â¶ÐÅÏ¢°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÓÖÝÉí·ÝÖ¤ºÅÂë¡¢¾üÊÂÉí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢ºÍͨ¹ý×Ô¶¯³µÅÆÊ¶±ðÏµÍ³ÍøÂçµÄÐÅÏ¢µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/ca-azusa-police-reveal-ransomware-attack-in-march/
6.¿¨°Í˹»ùÐû²¼ÓйØÀÕË÷Èí¼þJSWormµÄÑݱäµÄÆÊÎö±¨¸æ

¿¨°Í˹»ùÐû²¼ÁËÓйØÀÕË÷Èí¼þJSWormµÄÑݱäµÄÆÊÎö±¨¸æ¡£JSWormÀÕË÷Èí¼þÔÚ2019±»·¢Ã÷£¬´ÓÄÇÒԺ󣬷ºÆðÁËÖîÈçNemty¡¢nefilem¡¢OffwhiteµÈ²î±ðµÄ±äÖÖ¡£¸Ã¶ñÒâÈí¼þµÄ¿ª·¢Ö°Ô±Ò»Ö±ÔÚÖØÐ±àд´úÂ룬²¢ÊµÑéʹÓòî±ðµÄ·Ö·¢ÒªÁì¡£ÔÚ2020ÄêµÄʱ¼ä£¬¿ª·¢Ö°Ô±ÉõÖÁ½«±à³ÌÓïÑÔ´ÓC ++¸ü¸ÄΪGolang£¬²¢ÍêÈ«ÖØÐÂ×îÏÈÖØÐ´´úÂë¡£´Ó2019Ä꽨Éèµ½2020ÄêÉϰëÄ꣬JSWormµÄÈö²¥·½·¨°üÀ¨Trik botnet¡¢RIG¿ª·¢¹¤¾ß¡¢¼ÙµÄ¸¶¿îÍøÕ¾ºÍÀ¬»øÓʼþÔ˶¯µÈ¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/evolution-of-jsworm-ransomware/102428/


¾©¹«Íø°²±¸11010802024551ºÅ