¡¾Íþвͨ¸æ¡¿AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Ô±¨£¨2021Äê3Ô£©
2021-04-07
3Ô£¬AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¨NTI£©Ðû²¼Á˶à¸öÎó²îºÍÍþвÊÂÎñͨ¸æ£¬ÆäÖУ¬Î¢ÈíExchange Server¶à¸ö¸ßΣÎó²îºÍGitLabÔ¶³Ì´úÂëÖ´ÐÐÎó²îÓ°Ïì½Ï´ó¡£Ç°Õß°üÀ¨Exchange ·þÎñ¶ËÇëÇóαÔìÎó²î£¨CVE-2021-26855£©£ºÎ´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»½á¹¹HTTPÇëÇóɨÃèÄÚÍø²¢Í¨¹ýExchange Server¾ÙÐÐÉí·ÝÑéÖ¤£»Exchange ·´ÐòÁл¯Îó²î£¨CVE-2021-26857£©£º¾ßÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷Õß¿ÉÒÔÔÚExchange·þÎñÆ÷ÉÏÒÔSYSTEMÉí·ÝÔËÐÐí§Òâ´úÂ룻Exchange í§ÒâÎļþдÈëÎó²î£¨CVE-2021-26858/CVE-2021-27065£©£º¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²î½«ÎļþдÈë·þÎñÆ÷ÉϵÄí§ÒâĿ¼£¬¿ÉÍŽáCVE-2021-26855¾ÙÐÐ×éºÏ¹¥»÷£»¼°3¸öExchangeÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-26412/CVE-2021-26854/CVE-2021-27078£©£»ºóÕßGitLab ´úÂëÖ´ÐÐÎó²î±£´æÉçÇø°æ(CE)ºÍÆóÒµ°æ(EE)ÖУ¬Î´ÊÚȨµ«¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÿɿصÄmarkdownäÖȾѡÏ½á¹¹¶ñÒâÇëÇó´Ó¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£
ÁíÍ⣬±¾´Î΢Èí¹²ÐÞ¸´ÁË14¸öCritical¼¶±ðÎó²î£¬75¸öImportant ¼¶±ðÎó²î¡£Ç¿ÁÒ½¨ÒéËùÓÐÓû§¾¡¿ì×°ÖøüС£
ÔÚ±¾ÔµÄÍþвÊÂÎñÖУ¬ÓëÖйúÓйصÄÍþв×éÖ¯Ïà¶Ô»îÔ¾£¬ÆäÖаüÀ¨HAFNIUM×éÖ¯ºÍRedDelta×éÖ¯£»ÓÉÓÚ±¾ÔÂ΢ÈíÅû¶Exchange ServerµÄ¶à¸ö¸ßΣÎó²î£¬Õë¶ÔÔÆ·þÎñµÄ¹¥»÷ÒÀÈ»Êǹ¥»÷ÕßµÄÖØµã¡£Í¬Ê±£¬¸ßƵÂʸüеÄSysrv-hello½©Ê¬ÍøÂçÐèÒªÒýÆð¹Ø×¢¡£
ÒÔÉÏËùÓÐÎó²îÇ鱨ºÍÍþвÊÂÎñÇ鱨¡¢¹¥»÷×éÖ¯Ç鱨£¬ÒÔ¼°¹ØÁªµÄIOC£¬¾ù¿ÉÔÚAG¹«Ë¾ÍþвÇ鱨ÖÐÐÄ»ñÈ¡£¬ÍøÖ·£ºhttps://nti.nsfocus.com/
Ò»¡¢ Îó²îÌ¬ÊÆ
2021Äê03ÔÂAG¹«Ë¾¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼452¸öÎó²î, ÆäÖиßΣÎó²î38¸ö£¬Î¢Èí¸ßΣÎó²î20¸ö¡£

* Êý¾ÝȪԴ£ºAG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¬±¾±íÊý¾Ý×èÖ¹µ½2021.04.02
×¢£ºAG¹«Ë¾¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ ÍþвÊÂÎñ
1. HAFNIUM×éÖ¯Õë¶ÔÓÐÁãÈÕÎó²îʹÓõÄExchange Server¾ÙÐй¥»÷
¡¾±êÇ©¡¿HAFNIUM
¡¾Ê±¼ä¡¿2021-03-02
¡¾¼ò½é¡¿
MicrosoftÒѼì²âµ½¶à¸öÁãÈÕÎó²î£¬¿ÉÓÃÓÚÔÚÓÐÏÞÇÒÓÐÕë¶ÔÐԵĹ¥»÷ÖжÔMicrosoft Exchange ServerµÄÍâµØ°æ±¾¾ÙÐй¥»÷¡£ÔÚÊӲ쵽µÄ¹¥»÷ÖУ¬¹¥»÷ÕßʹÓÃÕâЩÎó²î»á¼ûÁËÍâµØExchange·þÎñÆ÷£¬´Ó¶ø¿ÉÒÔ»á¼ûµç×ÓÓʼþÕÊ»§£¬²¢ÔÊÐí×°ÖÃÆäËû¶ñÒâÈí¼þÒÔÔö½ø¶ÔÊܺ¦ÕßÇéÐεĺã¾Ã»á¼û¡£´Ë´ÎÔ˶¯¹é¹¦ÓÚHAFNIUM£¬¸Ã×éÖ¯Ö÷ÒªÕë¶ÔÃÀ¹ú¶à¸öÐÐÒµµÄʵÌ壬°üÀ¨Ñ¬È¾²¡Ñо¿Ö°Ô±¡¢×´Ê¦ÊÂÎñËù¡¢¸ßµÈ½ÌÓý»ú¹¹¡¢¹ú·À³Ð°üÉÌ¡¢Õþ²ßÖÇÄÒÍźͷÇÕþ¸®×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡8ÌõIOC£¬ÆäÖаüÀ¨8¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
2. MiraiбäÖÖÕë¶ÔÍøÂçÇå¾²×°±¸µÄ¹¥»÷Ô˶¯
¡¾±êÇ©¡¿Mirai
¡¾Ê±¼ä¡¿2021-03-15
¡¾¼ò½é¡¿
MiraiбäÖÖÕë¶ÔÍøÂçÇå¾²×°±¸µÄ¹¥»÷Ô˶¯ÖУ¬Ê¹ÓÃÁËÎå¸öÒÑÖªÎó²îºÍÈý¸öδ֪Îó²î£¬»®·ÖÊÇCVE-2020-25506£¨D-Link DNS-320·À»ðǽʹÓã©¡¢CVE-2020-26919£¨Netgear ProSAFE PlusÎó²î£©¡¢CVE-2019-19356£¨Netis WF2419ÎÞÏß·ÓÉÆ÷Îó²î£©¡¢CVE-2021-22502(Micro Focus Operation Bridge Reporter£¨OBR£©ÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î)¡¢CVE-2021-27561£¨Yealink×°±¸ÖÎÀíÔ¤ÈÏÖ¤Ô¶³ÌÖ´ÐдúÂëÎó²î£©ºÍÈý¸öIoTÎó²î£¬ÀÖ³ÉʹÓú󣬽«Å²ÓÃwgetÊÊÓóÌÐòÒÔ´Ó¶ñÒâÈí¼þ»ù´¡½á¹¹ÖÐÏÂÔØShell¾ç±¾£¬È»ºóshell¾ç±¾½«ÏÂÔØÎª²î±ð¼Ü¹¹±àÒëµÄ¶à¸öMirai¶þ½øÖÆÎļþ£¬²¢ÖðÒ»Ö´ÐÐÕâЩÏÂÔØµÄ¶þ½øÖÆÎļþ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡86ÌõIOC£¬ÆäÖаüÀ¨86¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
3. Sysrv-hello½©Ê¬ÍøÂçÔÚ¶Ìʱ¼ä¼¯³É14ÖÖÎó²î¹¥»÷·½·¨
¡¾±êÇ©¡¿Sysrv-hello
¡¾Ê±¼ä¡¿2021-03-15
¡¾¼ò½é¡¿
Sysrv-hello½©Ê¬ÍøÂçÊ״η¢Ã÷ÓÚ2020Äê12Ô£¬Ö®ºó¸üÐÂÆµÂʼ«¸ß¡£´ÓÄ¿½ñ²¶»ñµ½µÄ²¡¶¾°æÔÀ´¿´£¬¸Ã½©Ê¬ÍøÂçÈ䳿ģ¿é¹¥»÷·½·¨ÓÉ֮ǰÒÔ±¬ÆÆ¹¥»÷ΪÖ÷¡¢Îó²îʹÓÃΪ¸¨×ª±äΪ£ºÔ½·¢ÒÀÀµÎó²î¹¥»÷£¬Ð±äÖÖÔÚ¼«¶Ìʱ¼äÄÚÏòÈ䳿Èö²¥Ä£¿é¼¯³ÉÁË14ÖÖÐÂÎó²î¹¥»÷·½·¨¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com/research/report/1272.html
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡9ÌõIOC£¬ÆäÖаüÀ¨6¸öIPºÍ3¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
4. Operation DianxunÕë¶ÔµçÐŹ«Ë¾µÄÍøÂçÌØ¹¤Ô˶¯
¡¾±êÇ©¡¿Operation Dianxun
¡¾Ê±¼ä¡¿2021-03-16
¡¾¼ò½é¡¿
OperationsDiànxùnÊÇÒ»ÆðÕë¶ÔµçÐŹ«Ë¾µÄÍøÂçÌØ¹¤Ô˶¯£¬ÒÔÇÔÈ¡Óë5GÊÖÒÕÏà¹ØµÄÃô¸ÐÊý¾ÝºÍÉÌÒµÉñÃØÎªÄ¿µÄ£¬Ìᳫ´Ë´Î¹¥»÷Ô˶¯µÄÍþв×éÖ¯RedDeltaÒÉËÆÓëÖйúÓйء£
¡¾²Î¿¼Á´½Ó¡¿
https://www.mcafee.com//blogs/other-blogs/mcafee-labs/operation-dianxun-cyberespionage-campaign-targeting-telecommunication-companies/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡20ÌõIOC£¬ÆäÖаüÀ¨20¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
5. z0minerÍÚ¿óÍÅ»ïʹÓöàÖÖÎó²î¶ÔÔÆÖ÷»ú¾ÙÐй¥»÷
¡¾±êÇ©¡¿z0miner
¡¾Ê±¼ä¡¿2021-03-26
¡¾¼ò½é¡¿
z0minerÍÚ¿óÍÅ»ïʹÓöàÖÖÎó²î¶ÔÔÆÖ÷»ú¾ÙÐй¥»÷Ô˶¯£¬Îó²î¹¥»÷µ½ÊÖºó»áÏÂÔØ²î±ðµÄ¶ñÒâ¾ç±¾Ö´ÐУ¬»á¿¢Ê¾ºÆ·ÍÚ¿óľÂíÀú³Ì£¬É¾³ý¾ºÆ·ÍÚ¿óľÂíÎļþ£¬²¢ÊµÑéÌí¼ÓÍýÏëʹÃü£¨Ä¿½ñ²¶»ñµÄ°æ±¾ÔغÉΪ¿Õ£©¡£×îºóÏÂÔØÃÅÂÞ±ÒÍÚ¿óÄ£¿é¾ÙÐÐÍÚ¿óÅÌËã¡£z0minerÍÚ¿óÍÅ»ïʹÓõÄÎó²î°üÀ¨Nexus3ÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-7238£©¡¢ConfluenceδÊÚȨģ°æ×¢Èë/´úÂëÖ´ÐÐÎó²î£¨CVE-2019-3396£©¡¢WeblogicδÊÚȨÏÂÁîÖ´ÐÐÎó²î(CVE-2020-14882)¡¢JenkinsδÊÚȨÏÂÁîÖ´ÐÐÎó²î¡¢Struts2ÏÂÁîÖ´ÐÐÎó²î£¨s2-016£¬s2-046£©¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com//research/report/1283.html
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡5ÌõIOC£¬ÆäÖаüÀ¨5¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
6. ͨ¹ýPEC¾ÙÐеÄÐÂsLoadÔ˶¯ÈÔʹÓÃË«ZIP¸½¼þÊÖÒÕ
¡¾±êÇ©¡¿sLoad
¡¾Ê±¼ä¡¿2021-03-29
¡¾¼ò½é¡¿
½üÆÚ¹¥»÷Õß¾ÙÐеÄÀ¬»øÓʼþÔ˶¯ÖУ¬Í¨¹ýPEC»Ö¸´ÒÔʹÓúϲ¢µÄZIP¸½¼þÊÖÒÕ´«ÊäsLoad¶ñÒâÈí¼þ£¬²¢ÔÚÆäÖÐǶÌ×Ò»¸öÌØÁíÍâZIPÎļþ£¬¸ÃÎļþ°üÀ¨Ò»¸ö¾ßÓÐDropper¹¦Ð§µÄWSF¾ç±¾£¬ÓÃÓÚ´ÓÔ¶³Ì´æ´¢¿âÏÂÔØsLoad¡£
¡¾²Î¿¼Á´½Ó¡¿
https://cert-agid.gov.it/news/nuova-campagna-sload-via-pec-sfrutta-ancora-la-tecnica-del-doppio-allegato-zip/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡3ÌõIOC£¬ÆäÖаüÀ¨3¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

AG¹«Ë¾ÔÆ







