¡¶ÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫָÄÏ¡·£»Imperva³ÆÆäÊý¾Ýй¶µÄÔÒòÊÇAWS APIÃÜÔ¿±»µÁ£»NemtyµÄ½âÃܹ¤¾ß
°ä²¼¹¦·ò 2019-10-12
°Ä´óÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£©°ä²¼¡¶ÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫָÄÏ¡·£¬¸ÃÖ¸ÄÏÂÛÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµÄܹ»²ÉÈ¡ÄÄЩ´ëÊ©À´±£»¤×Ô¼ºÃâÊÜÇÖº¦¡£¸ÃÖ¸ÄÏרΪÖÐÓ×ÐÍÆóÒµÉè¼Æ£¬Ö¼ÔÚʹÆäÏàʶ¡¢²ÉÈ¡Ðж¯²¢¼ÓÇ¿ÆäÍøÂ簲ȫ·ÀÓùÄÜÁ¦£¬ÒÔÓ¦¶Ô²»ÐÝ·¢Õ¹µÄÍøÂ簲ȫÍþв¡£¸ÃÖ¸ÄϽéÉÜÁ˶ñÒâÈí¼þ¡¢´¹µöÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬»¹ÁоÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À´ëÊ©¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬ÓÉÓÚÎÞ·¨±£ÕÏ¿ÉÄܳÁлñµÃ½Ó¼ûȨ£»½¨ÒéÆóÒµ²ÉÈ¡×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶à³É·ÖÉí·ÝÑéÖ¤µÈ´ëÊ©£»½¨ÒéÔÚÈËÔ±ºÍÁ÷³ÌÖвÉÈ¡½Ó¼û½ÚÔì¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ£»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄ°²È«ÊõÓï´Ê»ã±í¡£
ÔÎÄÁ´½Ó£º
https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖØÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾
Confiant°²È«×êÑÐÈËÔ±Taha Karim·¢ÏÖÕë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂÆðÍ·£¬µ«Æäʱ×êÑÐÈËÔ±Ö»·¢ÏÖÁ˶ñÒâpayload Shlayer¡£ÔÚÁ½ÖÜǰ°ä²¼µÄÒ»·ÝºóÐø»ã±¨ÖУ¬×êÑÐÈËÔ±°µÊ¾·¢ÏÖÁËShlayerϰȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£Ä¿Ç°Ö»ÖªÂ·ShlayerÔÚÊÜϰȾµÄÖ÷»ú¸ßµÍÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõľßÌåÐÅÏ¢£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäºÅÁîºÍ½ÚÔì·þÎñÆ÷¡£¶øºóTarmac½«ÆÚ´ýкÅÁµ«ÊÇÓÉÓÚC2·þÎñÆ÷²»³ÉÓã¬Òò¶ø×êÑÐÈËÔ±ÎÞ·¨È·¶¨ÆäÈ«ÊýÖ°ÄÜ¡£¸Ã¶ñÒâ»î¶¯ÖØÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/3¡¢·¸×ïÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER
ƾ¾ÝFireEyeµÄ»ã±¨£¬·¸×ïÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÔö³¤ÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеĿªÊÍÆ÷£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬Æ¾¾Ý×êÑÐÈËÔ±µÄ±íÊö£¬ËûÃÇ·ÖÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐЧµÄÖ¤ÊéÊðÃûµÄ¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬Ô̺¬CARBANAKºóÃźÍRDFSNIFFER¡£RDFSNIFFERÄܹ»Ê¹¹¥»÷Õ߼ලºÍ´Û¸Äͨ¹ýNCR¹«Ë¾µÄRDFClient³ÉÁ¢µÄºÏ·¨Ïνӡ£×êÑÐÈËÔ±×Ü½á³ÆÐ¹¤¾ßºÍ¼¼ÊõµÄÒýÈëÅú×¢FIN7ÔÚ²»ÐÝ·¢Õ¹ÒÔÊÊÓ¦°²È«ÐÔ²»ÐݼÓÇ¿µÄ»·¾³¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔÒòÊÇAWS APIÃÜÔ¿±»µÁ
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/
5¡¢°²È«×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß
Tesorion×êÑÐÈËÔ±´´½¨ÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉϹ¤×÷µÄ½âÃÜÆ÷£¬²¢ÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£Ä¿Ç°½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÁ¿µÄÎļþÀ©´óÃû£¬·Ç³ß¶ÈÎļþÌåʽµÄ¼ÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬µ«TesorionÿÌì¶¼ÔÚ³ÖÐøÖ§³ÖеÄÎļþÀàÐÍ¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄ·þÎñÆ÷ÉÏʵÏÖ½âÃÜÃÜÔ¿µÄÌìÉú£¬×êÑÐÈËÔ±°µÊ¾´Ë¾ÙÊÇΪÁËÔ¤·ÀÀÕË÷Èí¼þ¿ª·¢ÈËÔ±·ÖÎö½âÃÜ·¨Ê½²¢ÏàʶÆäËã·¨µÄ·ì϶µØµã¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/
6¡¢SAP°ä²¼10Ô°²È«¸üУ¬½¨¸´Á½¸ö¹Ø¼ü·ì϶
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html


¾©¹«Íø°²±¸11010802024551ºÅ