SonatypeÔÚPyPI´æ´¢¿âÖз¢Ã÷¶à¸ö¿ÉÇÔÈ¡AWSƾ֤µÄ°ü
Ðû²¼Ê±¼ä 2022-06-271¡¢SonatypeÔÚPyPI´æ´¢¿âÖз¢Ã÷¶à¸ö¿ÉÇÔÈ¡AWSƾ֤µÄ°ü
¾ÝýÌå6ÔÂ25ÈÕ±¨µÀ£¬PyPI´æ´¢¿âÖб£´æ¶à¸ö¶ñÒâPython°ü£¬¿ÉÓÃÀ´ÇÔÈ¡AWSƾ֤µÈÐÅÏ¢¡£Æ¾Ö¤SonatypeµÄ˵·¨£¬¶ñÒâ³ÌÐò°ü»®·ÖÊÇloglib-modules¡¢pyg-modules¡¢pygrata¡¢pygrata-utilsºÍhkg-sol-utils¡£ÆäÖУ¬loglib-modulesºÍpygrata-utils°ü¿ÉÇÔÈ¡AWSƾ֤¡¢ÍøÂç½Ó¿ÚÐÅÏ¢ºÍÇéÐαäÁ¿£¬²¢½«ËüÃǵ¼³öµ½Ô¶³Ì¶Ëµãhxxp://graph.pygrata[.] com:8000//upload¡£ÏñpygrataÕâÑùµÄ°ü×Ô¼º²»°üÀ¨¶ñÒâ´úÂ룬µ«ÐèҪʹÓÃÉÏÊöÁ½¸öÄ£¿éÖ®Ò»×÷ΪÒÀÀµÏî¡£ÏÖÔÚ£¬ÕâЩ¶ñÒâ°üÒѱ»É¾³ý¡£
https://securityaffairs.co/wordpress/132598/hacking/pypi-malicious-packages-2.html
2¡¢ÈÕ±¾TB KawashimaµÄ×Ó¹«Ë¾Ôâµ½LockBitµÄÀÕË÷¹¥»÷
¾Ý6ÔÂ25ÈÕ±¨µÀ£¬ÈÕ±¾Æû³µÁ㲿¼þÖÆÔìÉÌ·áÌï·ÄÖ¯ÆìϵÄTB KawashimaÐû²¼£¬Æä×Ó¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¹¥»÷±¬·¢ÔÚÉÏÖÜËÄ£¬TB KawashimaµÄÌ©¹úÏúÊÛ¹«Ë¾±»¹¥»÷£¬¸Ã¹«Ë¾¹Ø±ÕÁ˹¥»÷Õß»á¼ûµÄ×°±¸¡£¹«Ë¾³ÆÆäÉú²úºÍÏúÊÛÔ˶¯Ã»ÓÐÊܵ½Ó°Ï죬ËùÓÐÓªÒµ¶¼ÔÚÕý³£ÔËÐУ¬µ«ÆäÍøÕ¾Òѹرա£ËäÈ»ÏÖÔÚûÓйØÓÚÕâ´Î¹¥»÷µÄ¹Ù·½ÐÅÏ¢£¬µ«LockBitÍÅ»ïÔÚ6ÔÂ17ÈÕÐû²¼£¬ËûÃǶÔTB KawashimaµÄ¹¥»÷ÊÂÎñÈÏÕæ¡£6ÔÂ25ÈÕ£¬¹¥»÷ÕßÒѾ×îÏÈй¶±»µÁµÄÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/automotive-fabric-supplier-tb-kawashima-announces-cyberattack/
3¡¢¹È¸èÒòÈö²¥²»¿É¿¿ÐÅÏ¢±»¶íÂÞ˹î¿Ïµ»ú¹¹·£¿î120ÍòÃÀÔª
ýÌå6ÔÂ24Èճƣ¬¶íÂÞ˹µçÐÅî¿Ïµ»ú¹¹Roskomnadzor¶Ô¹È¸è´¦ÒÔ6800Íò¬²¼£¨Ô¼ºÏ120ÍòÃÀÔª£©µÄ·£¿î¡£´Ë´Î·£¿îµÄÔµ¹ÊÔÓÉÊǹȸè×ÊÖúÈö²¥ÓйØÕ½ÕùµÄ²»¿É¿¿ÐÅÏ¢£¬²¢ÇÒûÓн«ÕâЩÐÅÏ¢´ÓËüµÄƽ̨ÉÑþ³Øý¡£¸Ã»ú¹¹ÌåÏÖ£¬¹È¸èµÄYouTubeÔÚÏßÊÓÆµ¹²ÏíÆ½Ì¨¡°¾ÓÐÄÖú³¤¡±Èö²¥½û¾øÈ·µÄÐÅÏ¢£¬´Ó¶øÀë¼ä¶íÂÞ˹¡£ÓÉÓÚÒ»ÔÙδÄÜÏÞÖÆ¶Ô¶íÂÞ˹եȡÐÅÏ¢µÄ»á¼û£¬¹È¸èÏÖÔÚ»¹ÃæÁٸߴïÆäÔÚ¶íÂÞ˹ÄêÓªÒµ¶îµÄ10%µÄ·£¿î¡£
https://www.bleepingcomputer.com/news/google/russia-fines-google-for-spreading-unreliable-info-defaming-its-army/
4¡¢CrowdStrikeÅû¶ÀÄÓÃMitel VOIPÎó²îµÄ¹¥»÷µÄÏêÇé
CrowdStrikeÔÚ6ÔÂ23ÈÕÅû¶ÁËÀÄÓÃMitel VOIPÖÐÐÂÎó²îµÄÀÕË÷¹¥»÷Ô˶¯¡£´Ë´Î±»Ê¹ÓõÄÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-29499£¬CVSSÆÀ·ÖΪ9.8£©£¬ÓÉÓÚÕï¶Ï¾ç±¾µÄÊý¾ÝÑé֤ȱ·¦µ¼Öµģ¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÌØÖÆÇëÇó×¢ÈëÏÂÁî¡£Îó²îµÄʹÓÃÉæ¼°Á½¸öGETÇëÇó£¬Ò»¸ö·¢Ë͵½×°±¸ÉÏ£¬Ä¿µÄÊÇÒ»¸öPHPÎļþµÄ"get_url"²ÎÊý£»µÚ¶þ¸öÔÚ×°±¸ÉÏÌìÉú£¬µ¼ÖÂÏÂÁî×¢È룬Ïò¹¥»÷ÕߵĻù´¡ÉèʩִÐÐHTTP GETÇëÇó¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ÍøÉÏÓÐÁè¼Ý21000̨¿É¹ûÕæ»á¼ûµÄMitel×°±¸£¬ÆäÖд󲿷ÖλÓÚÃÀ¹ú£¬Æä´ÎÊÇÓ¢¹ú¡£
https://www.crowdstrike.com/blog/novel-exploit-detected-in-mitel-voip-appliance/
5¡¢Ñо¿ÍŶӷ¢Ã÷Bronze StarlightÍÅ»ï½üÆÚµÄ¹¥»÷Ô˶¯
6ÔÂ23ÈÕ£¬SecureworksµÄÑо¿ÍŶӹûÕæÁËAPT×éÖ¯Bronze Starlight(APT10)½üÆÚµÄ¹¥»÷Ô˶¯¡£ÖÁÉÙ´Ó2015Äê×îÏÈ£¬¹¥»÷Õß¾ÍʹÓÃHUI LoaderÔÚÄ¿µÄÖ÷»úÉϼÓÔØÔ¶³Ì»á¼ûľÂí¡£¶ø´Ë´ÎÔ˶¯ÖУ¬¹¥»÷ÕßÔÚÈëÇÖºó»á×°ÖÃÀÕË÷Èí¼þ£¬ÈçLockFile¡¢Atom Silo¡¢Rook¡¢Night Sky¡¢PandoraºÍLockBit 2.0µÈ¡£ÆÊÎöÅú×¢£¬BRONZE STARLIGHTµÄÖ÷ÒªÄîÍ·¿ÉÄÜÊÇÇÔȡ֪ʶ²úȨ»ò¾ÙÐÐÌØ¹¤Ô˶¯£¬¶ø·Ç¾¼ÃÀûÒæ£¬ÀÕË÷Èí¼þ¿ÉÄÜÊÇΪÁËÊèɢĿµÄµÄ×¢ÖØÁ¦¡£±»¹¥»÷µÄÄ¿µÄ°üÀ¨Î÷ºÍÃÀ¹úµÄÖÆÒ©¹«Ë¾¡¢ÃÀ¹úýÌå»ú¹¹¡¢Á¢ÌÕÍðºÍÈÕ±¾µÄµç×ÓÔª¼þÉè¼ÆºÍÖÆÔìÉ̵ȡ£
https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader
6¡¢KasperskyÐû²¼¹ØÓÚ8¸öÖ÷ÒªÀÕË÷ÍÅ»ïµÄTTPµÄÆÊÎö±¨¸æ
KasperskyÔÚ6ÔÂ23ÈÕÐû²¼Á˹ØÓÚ8¸öÖ÷ÒªÀÕË÷ÍÅ»ïµÄTTPµÄÆÊÎö±¨¸æ¡£±¨¸æÖаüÀ¨µÄÀÕË÷ÍŻﻮ·ÖΪConti/Ryuk¡¢Pysa¡¢Clop(TA505)¡¢Hive¡¢Lockbit2.0¡¢RagnarLocker¡¢BlackByteºÍBlackCat¡£¹¥»÷Õßͨ³£ÊÔͼÕÒµ½¹ýʧÉèÖúͱ£´æÎó²îµÄÃæÏò¹«ÖÚµÄÓ¦ÓóÌÐò£¬ÒÔ±ã»ñµÃ³õʼ»á¼ûȨ£¬³£¼ûµÄÄ¿µÄ°üÀ¨Î¢ÈíExchange·þÎñÆ÷¡¢Sharepoint·þÎñÆ÷¡¢VPNºÍÆäËüÍøÂç·þÎñ£»×î³£±»Ê¹ÓõÄÎó²îÊÇProxyShell Îó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207¡£
https://securelist.com/modern-ransomware-groups-ttps/106824/


¾©¹«Íø°²±¸11010802024551ºÅ