GoogleºÍMetaÒòÇÖÕ¼Òþ˽Ȩ±»º«¹ú·£¿î7200ÍòÃÀÔª
Ðû²¼Ê±¼ä 2022-09-16
¾ÝýÌå9ÔÂ14ÈÕ±¨µÀ£¬º«¹úСÎÒ˽¼ÒÐÅÏ¢±£»¤Î¯Ô±»á(PIPC)ÒòÇÖÕ¼Òþ˽£¬¶ÔGoogle´¦ÒÔ692ÒÚº«Ôª£¨5000ÍòÃÀÔª£©·£¿î£¬¶ÔMeta´¦ÒÔ308ÒÚº«Ôª£¨2200ÍòÃÀÔª£©·£¿î¡£PIPCÌåÏÖ£¬ÕâÁ½¼Ò¹«Ë¾ÔÚÍøÂçÓû§Ê¹ÓÃ×Ô¼ºÆ½Ì¨ÒÔÍâµÄÆäËûÍøÕ¾»ò·þÎñµÄÔÚÏßÔ˶¯µÄÐÅϢʱ£¬Ã»ÓÐÃ÷È·¼û¸æÓû§»ò»ñµÃËûÃǵÄÔ޳ɡ£ÕâЩÊý¾Ý±»ÓÃÀ´ÆÊÎöËûÃǵÄÐËȤ£¬²¢ÍÆË͸öÐÔ»¯µÄ¹ã¸æ¡£´Ë´Î·£¿îÊǺ«¹úÓÐÊ·ÒÔÀ´¶ÔÎ¥·´Òþ˽·¨µÄ×î´ó´¦·Ö£¬Á½¼Ò¹«Ë¾¶¼Åú²µÁËίԱ»áµÄÊÓ²ìЧ¹û£¬MetaÌåÏÖ¿ÉÄÜ»áÔÚ·¨Í¥ÉÏ¶ÔÆä·£¿îÌá³öÖÊÒÉ¡£
https://www.theregister.com/2022/09/14/google_and_meta_fined_over/
2¡¢SparklingGoblinʹÓÃеÄLinuxºóÃŹ¥»÷ѧÊõÁìÓò×éÖ¯
ESETÔÚ9ÔÂ14ÈÕ͸¶Æä·¢Ã÷ÁËSideWalkºóÃŵÄLinux±äÌå¡£ÕâÊÇSparklingGoblinʹÓõĶà¸ö×Ô½ç˵ֲÈë³ÌÐòÖ®Ò»£¬ÓÚ2021Äê2Ô±»ÓÃÀ´¹¥»÷ÖйúÏã¸ÛµÄÒ»Ëù´óѧ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬¸ÃÍÅ»ïºã¾ÃÒÔÀ´Ò»Ö±ÒԸôóѧΪĿµÄ£¬ÀÖ³ÉÈëÇÖÁ˶à¸ö½¹µã·þÎñÆ÷£¬°üÀ¨´òÓ¡·þÎñÆ÷¡¢µç×ÓÓʼþ·þÎñÆ÷ºÍÓÃÓÚÖÎÀíѧÉúÈճ̰²ÅźͿγÌ×¢²áµÄ·þÎñÆ÷¡£±ðµÄ£¬SideWalkµÄLinuxºÍWindows±äÌåÔÚÔËÐз½·¨¡¢¶à¸ö×é¼þµÄʵÏÖÒÔ¼°·Ö·¢payloadµÄ·½Ãæ±£´æ¾ªÈ˵ÄÏàËÆÖ®´¦£¬°üÀ¨ÏàͬµÄ¶¨ÖÆChaCha20¡¢Èí¼þ¼Ü¹¹¡¢ÉèÖúÍdead-dropÆÊÎöÆ÷ʵÏÖ¡£
https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/
3¡¢±©Ñ©ÔâÓöDDoS¹¥»÷£¬Ê¹ÃüÕÙ»½ºÍħÊÞÌìϵȷþÎñÆ÷å´»ú
ýÌå9ÔÂ14Èճƣ¬±©Ñ©Ôâµ½DDoS¹¥»÷£¬¡¶Ê¹ÃüÕÙ»½¡·PCºÍ¡¶Ä§ÊÞÌìÏ¡·µÈÓÎÏ·µÄ·þÎñÆ÷å´»ú¡£¸Ã¹«Ë¾ÓÚ14ÈÕ̫ƽÑóʱ¼äÆÆÏþ00:45Ê×´ÎÈÏ¿ÉÁË·þÎñÆ÷·ºÆðÎÊÌ⣬ÆäʱËü˵ÕýÔÚÊÓ²ìÒ»¸öÓ°ÏìÆäÈÏÖ¤·þÎñÆ÷µÄÎÊÌ⣬¸ÃÎÊÌâ¿ÉÄܵ¼ÖµÇ¼ʧ°Ü»ò»ºÂý¡£45·ÖÖÓºó£¬ËüÐû²¼¸üÐÂÈ·ÈÏÖÐÖ¹ÊÇÓÉÓÚÔâµ½ÁËDDoS¹¥»÷£¬¹¥»÷ÕßÔÚÊÔÍ¼ÆÆËðÆäÍøÂ磬ËûÃǽ«¼ÌÐøÆð¾¢¼à¿ØÕýÔÚ¾ÙÐеÄDDoS¹¥»÷¡£×îÐÂÐÂÎųƣ¬×èÖ¹Ó¢¹úʱ¼äÖÐÎç12:18£¬Õë¶Ô±©Ñ©·þÎñÆ÷µÄDDoS¹¥»÷ÒѾ¿¢Ê¡£
https://www.videogameschronicle.com/news/call-of-duty-pc-world-of-warcraft-servers-down-as-blizzard-suffers-ddos-attack/
4¡¢UNC4034ͨ¹ýľÂí»¯PuTTY SSH¿Í»§¶ËÀ´¹¥»÷´«Ã½ÐÐÒµ
9ÔÂ14ÈÕ£¬Mandiant³ÆÔÚ7Ô·ݷ¢Ã÷ÁËUNC4034Õë¶Ô´«Ã½ÐÐÒµµÄÐÂÐÍÓã²æÊ½´¹ÂÚÔ˶¯¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýWhatsAppÓëÄ¿µÄ½¨ÉèͨѶ£¬²¢ÒýÓÕËûÃÇÏÂÔØ¶ñÒâISOÈí¼þ°ü£¬¸ÃÈí¼þ°üÒÔÐéαµÄÊÂÇéʱ»úΪÓÕ¶ü£¬×îÖÕ»áͨ¹ýľÂí»¯PuTTY×°ÖúóÃÅAIRDRY.V2¡£ÓÉÓÚPuTTY¿ÉÖ´ÐÐÎļþÊÇ´ÓÕýµ±³ÌÐò±àÒë¶øÀ´µÄ£¬Òò´Ë¹¦Ð§ÆëÈ«ÇÒ¿´ÆðÀ´ÓëÕýµ±°æ±¾ÍêȫһÑù¡£¹¥»÷ÕßÐÞ¸ÄÁËPuTTYµÄconnect_to_host()º¯Êý£¬ÒÔ±ãÔÚÀÖ³ÉÅþÁ¬SSHºó£¬¸Ã³ÌÐòÒÔDLL£¨"colorui.dll"£©µÄÐÎʽװÖÃÒ»¸ö¶ñÒâµÄDAVESHELL shellcode payload¡£
https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing
5¡¢Check Point ResearchÐû²¼8Ô·ÝÈ«ÇòÍþвָÊý±¨¸æ
Check Point ResearchÔÚ9ÔÂ14ÈÕÐû²¼ÁË8Ô·ÝÈ«ÇòÍþвָÊý±¨¸æ¡£±¨¸æÖ¸³ö£¬FormBookÊÇ8Ô·Ý×î³£¼ûµÄ¶ñÒâÈí¼þ£¬È¡´úÁË×Ô1ÔÂÒÔÀ´Ò»Ö±¼á³ÖÕâһְλµÄEmotet£¬Æä´ÎÊÇAgentTesla¡¢XMRig¡¢GuloaderºÍEmotet¡£±¾Ô½ÌÓýºÍÑо¿ÁìÓòÊÇÈ«ÇòÊܵ½¹¥»÷×î¶àµÄÐÐÒµ£¬Æä´ÎÊÇÕþ¸®/¾üʺÍISP/MSPÐÐÒµ¡£×î³£±»Ê¹ÓõÄÎó²îÊÇLog4jÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-44228£©£¬Ó°ÏìÁËÈ«Çò44%µÄ×éÖ¯¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þÊÇAlienBot£¬Æä´ÎÊÇAnubisºÍJoker¡£
https://blog.checkpoint.com/2022/09/14/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index/
6¡¢Unit 42Ðû²¼¹ØÓÚ¶ñÒâÈí¼þOriginLoggerµÄÆÊÎö±¨¸æ
9ÔÂ13ÈÕ£¬Unit 42ÏêϸÏÈÈÝÁËÃûΪOriginLoggerµÄ¶ñÒâÈí¼þµÄÊÖÒÕϸ½Ú£¬Ëü±»´µÅõΪAgent TeslaµÄ¼ÌÈÎÕß¡£¸Ã¶ñÒâÈí¼þͨ¹ýÒ»¸öÓÕ¶üWordÎĵµ·Ö·¢£¬Ä¿µÄ·¿ª¸ÃÎĵµÊ±»áÏÔʾµÂ¹ú¹«ÃñµÄ»¤ÕÕºÍÐÅÓÿ¨µÄͼÏñ£¬ÒÔ¼°Ç¶ÈëÆäÖеÄһЩExcelÊÂÇé±í¡£ÊÂÇé±í°üÀ¨Ò»¸öVBAºê£¬Ê¹ÓÃMSHTAŲÓÃÍйÜÔÚÔ¶³Ì·þÎñÆ÷ÉϵÄHTMLÒ³Ãæ£¬ÆäÖаüÀ¨Ò»¸ö»ìÏýµÄJavaScript´úÂ룬ÓÃÓÚ»ñÈ¡ÍйÜÔÚBitbucketÉϵÄÁ½¸ö±àÂë¶þ½øÖÆÎļþ£¬È»ºóʹÓÃÀú³Ì¿ÕÐÄÊÖÒÕ½«OrionLogger payload×¢Èëµ½aspnet_compiler.exeÀú³ÌÖС£
https://unit42.paloaltonetworks.com/originlogger/


¾©¹«Íø°²±¸11010802024551ºÅ