Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
Ðû²¼Ê±¼ä 2022-03-02Òò¹©Ó¦ÉÌÔâµ½¹¥»÷£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ×îÏÈ£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÆäÖ÷ÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¾ÝÔ¤¼Æ£¬´Ë´ÎÊÂÎñ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5%£¬Ô¼ºÏ13000Á¾Æû³µ¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄÏêϸӰÏì¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖÐÖ¹»áÒ»Á¬¶à¾Ã¡£
https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/
°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓзþÎñÖÐÖ¹
¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂ磬²¢¹Ø±ÕËùÓзþÎñ¡£ÏÖÔÚ£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨»á¼û£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½£¬Õâ¶ÔÁгµµÄÔËÓª±¬·¢Á˼«´óµÄÓ°Ïì¡£¼¸ÈÕǰ£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£
https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html
Ñо¿ÍŶӷ¢Ã÷Õë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷Ô˶¯
¾Ý2ÔÂ24Èյı¨µÀ£¬Bitdefender·¢Ã÷Á˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷Ô˶¯¡£¸ÃÔ˶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ£¬ÒÔÕË»§¶³½áΪÓÕ¶ü£¬ÓÕʹĿµÄµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄ´¹ÂÚÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂ룬ּÔÚÇÔȡĿµÄÒøÐÐÕË»§ÖеÄÓà¶î¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý£¬´ó²¿·Ö´¹ÂÚÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£©£¬Æä´ÎΪӢ¹ú£¨7%£©£»´ó²¿·ÖÓʼþÀ´×ÔÃÀ¹úµÄIPµØµã£¨40%£©£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£
https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/
Ñо¿Ö°Ô±¹ûÕæÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄ̸Ìì¼Í¼
2ÔÂ27ÈÕ±¨µÀ³Æ£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõ̸Ìì¼Í¼¹ûÕæ¡£¾ÝϤ£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿Ö°Ô±Ð¹Â¶µÄ£¬Ëû¿ÉÒÔ»á¼ûContiµÄXMPP̸Ìì·þÎñÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë£¬×ܹ²ÓÐ393¸öJSONÎļþ£¬°üÀ¨2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÐÂÎÅ¡£ÕâЩ¼ÍÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖÖÔ˶¯µÄÐÅÏ¢£¬°üÀ¨ÒÔǰδ¹ûÕæµÄ±»¹¥»÷Ä¿µÄ¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØµãÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£
https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/
CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ
2ÔÂ24ÈÕ£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð£¬ÒѸüÐÂÁËÆß´Î¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ£¬Í¨¹ýÍøÂç´¹ÂÚµç×ÓÓʼþ½øÈëÄ¿µÄϵͳ¡£ÆäÍŽáÁËÇÔÈ¡³ÌÐò¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨѶ£¬Ö§³ÖTorÍøÂ磬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£
https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/
Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄÆÊÎö±¨¸æ
¾Ý2ÔÂ27ÈÕ±¨µÀ£¬Intel 471Åû¶Á˰´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨѶÀ´¼ìË÷¶ñÒâpayloadµÄURL£¬²¢×°ÖÃÔÚÄ¿µÄÖ÷»úÉÏ£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£Í¨³£ÒÀÀµ¾ÓÉSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾¾ÙÐзַ¢£¬¿É×°Öò¢Ö´ÐжàÖÖ¶ñÒâpayload£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£
https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/
Çå¾²¹¤¾ß
DRAKVUF Sandbox
×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þÆÊÎöϵͳ£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£
https://github.com/CERT-Polska/drakvuf-sandbox
StayKit
Cobalt Strike ³¤ÆÚÐÔµÄÀ©Õ¹£¬ËüʹÓà SharpStay .NET ³ÌÐò¼¯µÄ execute_assembly º¯Êý¡£
https://github.com/0xthirteen/StayKit
Fennec
Óà Rust ±àдµÄ¹¤¼þÍøÂ繤¾ß£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄÊÂÎñÏìӦʱ´úʹÓá£
https://github.com/AbdulRhmanAlfaifi/Fennec
request smuggler
Http ÇëÇó×ß˽Îó²îɨÃèÆ÷£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽Îó²î¹¥»÷µÄ·þÎñÆ÷¡£
https://github.com/Sh1Yo/request_smuggler
Shellcode Template
ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£
https://github.com/Cracked5pider/ShellcodeTemplate
Çå¾²ÆÊÎö
CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/
ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â
https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/
ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã
https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/
΢ÈíÐû²¼ÔÚ Windows 11 ÖоÙÐÐÐ嵀 Windows ¸üÐÂË¢ÐÂ
https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml


¾©¹«Íø°²±¸11010802024551ºÅ