AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.22-2020.06.28£©
2020-06-29
Ò»¡¢ Íþвͨ¸æ
Apache Dubbo ProviderĬÈÏ·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-06-23 17:00:00 GMT
¡¾¸ÅÊö¡¿
2020Äê6ÔÂ23ÈÕ£¬Apache DubboÐû²¼Ç徲ͨ¸æÅû¶ProviderĬÈÏ·´ÐòÁл¯µ¼ÖµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1948£©£¬¹¥»÷Õß¿ÉÒÔ·¢ËÍ´øÓÐÎÞ·¨Ê¶±ðµÄ·þÎñÃû»òÒªÁìÃû¼°Ä³Ð©¶ñÒâ²ÎÊý¸ºÔصÄRPCÇëÇ󣬵±¶ñÒâ²ÎÊý±»·´ÐòÁл¯Ê±½«µ¼Ö´úÂëÖ´ÐС£
¡¾Á´½Ó¡¿
http://blog.nsfocus.net/apache-dubbo-0623/
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. ¹¥»÷ÕßʹÓÃIndigoDropÕë¶ÔÄÏÑǾüʺÍÕþ¸®×éÖ¯
¡¾¸ÅÊö¡¿
½üÆÚÒÔ¾üÊÂÖ÷ÌâΪÓÕ¶üµÄ¹¥»÷Ô˶¯£¬Í¨¹ý¶ñÒâMicrosoft OfficeÎĵµÈö²¥°üÀ¨ÍêÕûRAT¹¦Ð§µÄCobalt Strike£¬ÕâЩ¶ñÒâÎĵµÊ¹ÓöñÒâºêÀ´¾ÙÐжà½×¶ÎºÍ¸ß¶ÈÄ£¿é»¯µÄѬȾ£¬²¢ÇÒʹÓù«¹²·þÎñÆ÷ºÍ˽ÓзþÎñÆ÷µÄ×éºÏÀ´ÍÐ¹ÜÆä¶ñÒâÓÐÓøºÔØ£¬IndigoDropÈÏÕæ´ÓÏÂÔØURL»ñÈ¡×îÖÕµÄÓÐÓøºÔØÒÔ¾ÙÐа²ÅÅ£¬´Ë´Î¹¥»÷Õë¶ÔÄÏÑǵľüʺÍÕþ¸®×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/06/indigodrop-maldocs-cobalt-strike.html
2. XORDDoSºÍKaiji½©Ê¬ÍøÂç±äÖÖÕë¶ÔDocker·þÎñÆ÷
¡¾¸ÅÊö¡¿
XORDDoSºÍKaijiÊÇLinux½©Ê¬ÍøÂç¶ñÒâÈí¼þÀàÐ͵ıäÌ壬´Ë´Î¹¥»÷ÊÇXORDDoSÊ״ν«Docker·þÎñÆ÷×÷ΪĿµÄ¡£¹¥»÷ÕßɨÃè̻¶µÄDocker·þÎñÆ÷ͨѶ¶Ë¿Ú2375ºóʹÓý©Ê¬ÍøÂçÖ´Ðб©Á¦¹¥»÷£»Kaiji½©Ê¬ÍøÂçͬÑùɨÃè¶Ë¿Ú2375̻¶µÄÖ÷»ú£¬¶ÔDocker·þÎñÆ÷Ö´ÐÐping²Ù×÷£¬È»ºó°²ÅÅÖ´ÐÐKaiji¶þ½øÖÆÎļþµÄ¶ñÒâARMÈÝÆ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/
3. BRONZE VINEWOOD×éÖ¯Ãé×¼¹©Ó¦Á´»ú¹¹
¡¾¸ÅÊö¡¿
BRONZE VINEWOOD£¬Ò²±»³ÆÎªAPT31¡¢ZIRCONIUM£¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄÍþв×éÖ¯£¬¸Ã×éÖ¯ÓëÖйúÓйء£½üÆÚBRONZE VINEWOOD×é֯ʵÑéÇÔȡƾ֤²¢Ê¹ÓÃÕýµ±µÄÔ¶³Ì»á¿´·¨¾ö¼Æ»®ºÍÐÒéµÈ¶àÖÖ¹¤¾ßºÍÊÖÒÕÀ´»á¼ûÇéÐΣ¬¶ÔÈí¼þÌṩÉÌºÍÆäËû¹©Ó¦Á´×éÖ¯µÄ¹¥»÷Ö¼ÔÚ»á¼û¿Í»§µÄÊý¾Ý»òÍøÂç¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.secureworks.com/research/bronze-vinewood-targets-supply-chains
4. Õë¶ÔÃåµéµÄÍøÂçÌØ¹¤¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
¹¥»÷ÕßÕë¶ÔÃåµéÌᳫÓã²æÊ½´¹ÂÚ¹¥»÷£¬ÏòÄ¿µÄÓû§·Ö·¢´øÓжñÒâLNKÎļþµÄµç×ÓÓʼþ£¬¶ñÒâÎļþÍйÜÔÚGoogleÔÆ¶ËÓ²ÅÌÖÐÒÔÌӱܷÀ²¡¶¾ºÍÇ徲ɨÃè³ÌÐòʶ±ð£¬¸ÃÎļþÒ»µ©Ö´ÐУ¬½«ÔÚºǫ́ÍϷŲ¢ÔËÐпÉÖ´ÐÐÎļþ£¬²¢Ê¹Óù¤¾ßOctopus¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.anomali.com/blog/unknown-china-based-apt-targeting-myanmarese-entities
5. Lucifer¶ñÒâÈí¼þʹÓÃÎó²îѬȾWindows×°±¸
¡¾¸ÅÊö¡¿
LuciferÊǼÓÃÜÐ®ÖÆºÍDDoS¶ñÒâÈí¼þ±äÌåµÄÍŽᣬËüʹÓþÉÎó²îÔÚWindowsƽ̨ÉÏÈö²¥ºÍÖ´ÐжñÒâÔ˶¯£¬¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¾ÙÐÐMoneroµÄÃÜÂëÐ®ÖÆ£¬Äܹ»Ê¹Óöà¸öÎó²îºÍƾ֤¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷ÒÔ¼°×ÔÎÒÈö²¥£¬²¢ÇÒÕë¶ÔÄÚ²¿Ò×Êܹ¥»÷µÄÄ¿µÄѬȾ²¢ÔËÐÐEternalBlue£¬EternalRomanceºÍDoublePulsarºóÃÅ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/
6. FIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ
¡¾¸ÅÊö¡¿
FIN7£¬ÊÇÒ»¸öÓвÆÎñÄîÍ·µÄÍþв×éÖ¯£¬×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Ö÷ÒªÕë¶ÔÂùݺͲÍÒûÒµ¡£½üÆÚFIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ£¬Í¨¹ý¶ñÒâµÄshimÊý¾Ý¿â·Ö·¢£¬Äܹ»²¶»ñTrack1ºÍTrack2ÐÅÓÿ¨Êý¾Ý¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pillowmint-fin7s-monkey-thief/
7. ÀÕË÷Èí¼þCryCryptorαװ³ÉCOVID-19×·×ÙÓ¦ÓÃÈö²¥
¡¾¸ÅÊö¡¿
½üÆÚ¹¥»÷ÕßÔÚ¹¥»÷Ô˶¯Öн«ÀÕË÷Èí¼þCryCryptorαװ³É¹Ù·½COVID-19ÁªÏµÈË×·×ÙÓ¦ÓóÌÐò£¬Í¨¹ýÁ½¸ö¶ñÒâ·Ö·¢ÍøÕ¾·Ö·¢¸øÎ»ÓÚ¼ÓÄôóµÄAndroid×°±¸Óû§£¬²¢¶ÔÉè±¹ØÁ¬ÄÎļþ¾ÙÐмÓÃÜ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/
8. Hidden Cobra×éÖ¯µÄжñÒ⹤¾ß
¡¾¸ÅÊö¡¿
Hidden Cobra×éÖ¯ÔÚÒÑÍùµÄÊ®ÄêÖÐÒ»Ö±ºÜ»îÔ¾£¬½ñÄê5ÔÂÃÀ¹úÕþ¸®»ú¹¹Ðû²¼µÄ±¨¸æÖÐÐÎòHidden Cobra×éÖ¯µÄÈý¸öжñÒ⹤¾ßCOPPERHEDGE¡¢TAINTEDSCRIBEºÍPEBBLEDASH¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.reversinglabs.com/blog/hidden-cobra
9. ʹÓÃGoogle Analytics·þÎñÇÔÈ¡Óû§Êý¾Ý
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃGoogle AnalyticsÖеÄÐÅÍÐÀ´Ê¹ÓÃGoogle Analytics APIÈÆ¹ýÄÚÈÝÇå¾²Õ½ÂÔ£¨CSP£©£¬ÔÚÏßÊÐËÁÍøÕ¾Ê¹ÓÃGoogle Analytics·þÎñ¸ú×Ù»á¼ûÕߣ¬Òò´Ë£¬Google AnalyticsÓòÔÚÆäCSPÉèÖÃÖÐÁÐÈëÁ˰×Ãûµ¥£¬¹¥»÷Õß¿ÉÒÔ»á¼ûGoogle AnalyticsÕÊ»§Öеı»µÁÊý¾Ý¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securityaffairs.co/wordpress/105086/cyber-crime/google-analytics-e-skimming.html
10. DarkVision RATÄ£¿é»¯¶ñÒâÈí¼þÕýÔÚ±»Æð¾¢ÏúÊÛ
¡¾¸ÅÊö¡¿
DarkVision RATÊÇÒ»¸öÔ¶³Ì»á¼û¹¤¾ß(RAT)£¬½ÓÄÉÄ£¿é»¯²å¼þ½á¹¹£¬ÊÇÒ»ÖÖ¼òÆÓ¡¢Ò×ÓúÍÓû§ÓѺõŤ¾ß°ü£¬¾ßÓÐϵͳ¿ØÖÆ£¬Àú³ÌÖÎÀíÆ÷£¬×¢²á±í±à¼ºÍÎļþÖÎÀíÆ÷µÈ¹¦Ð§¡£¿ËÈÕDarkVision RATÔÚÍøÂç·¸·¨ºÍºÚ¿ÍÂÛ̳Öб»Æð¾¢ÏúÊÛ£¬ÉÐÓÐרÃŵÄÏúÊÛÍøÕ¾¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.deepinstinct.com/2020/06/23/new-on-the-scene-darkvision-rat/
11. IcedIDÒøÐÐľÂí±äÖÖʹÓÃCOVID-19ÓÕ¶üÈö²¥
¡¾¸ÅÊö¡¿
IcedIDÒøÐÐľÂíÓÚ2017ÄêÊ״ηºÆðÔÚÍþвÁìÓò£¬ÀàËÆÓÚÆäËû½ðÈÚľÂí£¬IcedID¿ÉÌᳫä¯ÀÀÆ÷ÖеĹ¥»÷£¬ÒÔ¼°×èµ²ºÍÇÔÈ¡Êܺ¦ÕߵĽðÈÚÐÅÏ¢¡£½üÆÚIcedIDÒøÐÐľÂíбäÖÖÒÔCOVID-19Ö÷ÌâÀ¬»øÓʼþÈö²¥£¬Ð±äÖÖ¿ÉÇÔÌýÊܺ¦ÕßµÄÍøÂçÔ˶¯£¬´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÃÀ¹úÓû§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securityaffairs.co/wordpress/105049/malware/icedid-banking-trojan-steganography.html
12. TrickbotʹÓÃCobalt Strike¹¥»÷·þÎñÆ÷
¡¾¸ÅÊö¡¿
TrickbotÔËÓªÉÌʹÓ÷þÎñÆ÷ÄÚ²¿µÄPowerTrickºÍCobalt Strike°²ÅÅAnchorºóÃųÌÐòºÍRYUKÀÕË÷Èí¼þ£¬Ê¹ÓÃÐí¶à¿ªÔ´¾ç±¾ºÍ¹¤¾ßÀ´ÍøÂçÐÅÏ¢£¬²¢Ñ¬È¾×ªÒƵ½ÆäËûϵͳ£¬TrickBotÄ£¿éÔÚÊÜѬȾµÄϵͳÉÏÍøÂç´ó×ÚÊý¾Ý£¬²¢ÊµÑéתµ½Óò¿ØÖÆÆ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://labs.sentinelone.com/inside-a-trickbot-cobaltstrike-attack-server/
13. ʹÓÃEXIFÔªÊý¾ÝÒþ²ØÐÅÓÿ¨ÊèÉ¢Æ÷
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃͼÏñµÄ“°æÈ¨ÔªÊý¾Ý”×Ö¶ÎÀ´¼ÓÔØÆäWebÊèÉ¢Æ÷£¬ÓÉÊܵ½ÆÆËðµÄÔÚÏßÊÐËÁÉñÃØ¼ÓÔØ£¬²¢ÇÒʹÓÃͼÏñÎļþ×÷Ϊαװ¾ÙÐÐÈö²¥¡£´ËÊèÉ¢Æ÷½«²¶»ñÊäÈë×ֶεÄÄÚÈÝ£¬ÈçÔÚÏß¹ºÎïÕßµÄÐÕÃû£¬Õ˵¥µØµãºÍÐÅÓÿ¨ÏêϸÐÅÏ¢µÈÊý¾Ý¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.malwarebytes.com/threat-analysis/2020/06/web-skimmer-hides-within-exif-metadata-exfiltrates-credit-cards-via-image-files/

AG¹«Ë¾ÔÆ







