×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçXantheÀûÓÃDockerAPIϰȾLinux£»Ó¡¶ÈIIMJobsÍøÕ¾Ôâµ½¹¥»÷  £¬140ÍòÓû§µÄÊý¾Ýй¶

°ä²¼¹¦·ò 2020-12-03

1.×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçXantheÀûÓÃDockerAPIϰȾLinux


1.jpg


×êÑÐÍŶӷ¢ÏÖÁËÒ»¸öÃûΪXantheµÄÃÅÂÞ±Ò¼ÓÃܽ©Ê¬ÍøÂç  £¬¿ÉÀûÓÃÅäÖÃÃýÎóµÄDocker APIÀ´Ï°È¾Linuxϵͳ¡£¸Ã¶ñÒâÈí¼þ¿ÉÀûÓöàÖÖ²½Öè½øÐд«²¼  £¬ÈçÍøÂç¿Í»§¶ËÖ¤ÊéÒÔͨ¹ýSSH´«²¼µ½Ö¸±êÖ÷»ú¡£´Ë±í  £¬XantheÓµÓÐËĸöÓÃÀ´Èƹý¼ì²â²¢Ôö³¤ÓƾÃÐԵĸ½¼ÓÄ£¿é  £¬±ðÀëΪ¹ý³Ì°µ²ØÄ£¿é£¨libprocesshider.so£©£»½ûÓÃÆäËû¿ó¹¤ºÍ°²È«·þÎñµÄshell¾ç±¾£¨xesa.txt£©£»ÓÃÓÚɾ³ýDockerÈÝÆ÷ÖеľºÕùÐÔDockerÖ¸±ê¼ÓÃÜľÂíµÄshell¾ç±¾(fczyo)ºÍXMRig¶þ½øÔìÎļþ£¨ÒÔ¼°JSONÅäÖÃÎļþconfig.json£©¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/misconfigured-docker-servers-xanthe-malware/161732/


2.ºÚ¿ÍÀûÓÃ×Ô¶¯×ª·¢µç×ÓÓʼþ¹æ¶¨Ö°ÄÜ¿ÉÈÆ¹ý¼ì²â


2.jpg


Áª¹úµ÷²é¾Ö£¨FBI£©·¢ÏÖºÚ¿ÍÀûÓÃ×Ô¶¯×ª·¢µç×ÓÓʼþ¹æ¶¨Ö°ÄÜ¿ÉÈÆ¹ý¼ì²â¡£¸ÃÖ°ÄÜÔÊÐíµç×ÓÓʼþµØÖ·µÄËùÓÐÕßÉèÖù涨  £¬µ±Âú×ãÌØ¶¨Ç°Ìáʱ¿É½«´«ÈëµÄµç×ÓÓʼþת·¢µ½ÁíÒ»¸öµØÖ·¡£Òò¶øºÚ¿ÍÎÞÐèð×Å´¥·¢¿ÉÒɵǼ°²È«ÖÒ¸æµÄ·çÏÕÿÌìµÇ¼ָ±êÕË»§  £¬¾Í¿ÉÊÕµ½ËùÓеç×ÓÓʼþµÄ¸±±¾¡£FBI°µÊ¾ÕâÖÖ·½Ê½ÔÚBEC¹¥»÷Öб»´óÁ¿ÀÄÓà  £¬ºÚ¿ÍÔÚÈëÇÖÁËÖ¸±êµç×ÓÓʼþÕÊ»§ºó  £¬À´Ëµ·þÆäËûÔ±¹¤»òÒµÎñͬ°éÊÚȨÏòÆä×Ô¼ºµÄÕÊ»§¸¶¿î¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-warns-of-email-forwarding-rules-being-abused-in-recent-hacks/


3.Ó¡¶ÈIIMJobsÍøÕ¾Ôâµ½¹¥»÷  £¬140ÍòÓû§µÄÊý¾Ýй¶


3.jpg


Ó¡¶ÈÇóÖ°ÍøÕ¾IIMJobsÔâµ½ÍøÂç¹¥»÷  £¬140ÍòÓû§µÄÊý¾Ýй¶¡£¸ÃÊý¾Ý¿âÓÚ2020Äê11ÔÂ23ÈÕй¶  £¬ÆäÖÐÔ̺¬¶à´ï46GBµÄÊý¾Ý  £¬Ó°ÏìÁËÔ¼140Íò×¢²áÁ˸ÃÍøÕ¾µÄÇóÖ°ÕߺÍÕÐÆ¸Õß¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬Óû§ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢µØÀíµØÎ»¡¢Ö°Òµ»ò¹¤×÷¼°LinkedIn×ÊÁÏÁ´½Ó¡£´Ë±í  £¬ºÚ¿ÍÒÑÔÚ°µÍøÉϹ«¿ªÁËÔ̺¬Ê¹ÓÃMD5¼ÓÃܵĵç×ÓÓʼþµØÖ·ºÍÃÜÂë¹þÏ£µÄÊý¾Ý¿âµÄ½âÎö°æ±¾¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/indian-job-portal-iimjobs-hacked-database-leaked/


4.AspenPointeÒ½ÔºÔâ¹¥»÷  £¬½ü30Íò»¼ÕßÃô¸ÐÊý¾Ýй¶


4.jpg


ÃÀ¹ú·ÇͶ»úÐÔÒ½ÔºAspenPointeÔâ¹¥»÷  £¬½ü30Íò»¼ÕßÃô¸ÐÊý¾Ýй¶¡£¸ÃÒ½Ôº³Æ  £¬Æä¼ì²âµ½ÁËÓÚ2020Äê9ÔÂ12ÈÕÖÁ9ÔÂ22ÈÕÖ®¼ä¶ÔÍøÂçδ¾­ÊÚȨµÄ½Ó¼û  £¬Ö®ºóµ±¼´·¢Õ¹µ÷²é¡£µ÷²éÓÚ11ÔÂ10ÈÕʵÏÖ  £¬·¢ÏÖºÚ¿Í¿ÉÄܽӼû»¼ÕßµÄÃô¸ÐÊý¾Ý  £¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢ÒøÐÐÕÊ»§ÐÅÏ¢¡¢Éç»á±£Ïպš¢Ò½ÁƲ¹Öú±àºÅ¡¢¾ÍÕïÈÕÆÚ¡¢ÈëÔºÈÕÆÚ¡¢³öÔºÈÕÆÚºÍÕï¶Ï´úÂë¡£¸ÃÊÂÎñÒÑÓÚ11ÔÂ19Èջ㱨¸øÎÀÉúºÍ¹«¼Ò·þÎñ²¿¹«ÃñÈ¨ÊÆ°ì¹«ÊÒ  £¬×ܹ²Ó°Ïìµ½295617¸ö»¼Õß¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/aspenpointe-cyber-attack/


5.Juniper°ä²¼½©Ê¬ÍøÂçDarkIRCµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


5.jpg


Juniper Threat Labs°ä²¼ÁËÓйؽ©Ê¬ÍøÂçDarkIRCµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£Õâ´Î¹¥»÷»î¶¯ÀûÓÃÁËOracle WebLogic·þÎñÆ÷ÖеÄRCE·ì϶£¨CVE-2020-14882£©  £¬Ö¼ÔÚÖ¸±ê·þÎñÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£DarkIRCÓµÓжàÖÖÖ°ÄÜ  £¬Ô̺¬ÓÚ¼üÅ̼ͼ  £¬ÏÂÔØÎļþ  £¬ÔÚÊÜϰȾ·þÎñÆ÷ÉÏÖ´ÐкÅÁî  £¬ÇÔȡƾ֤  £¬Í¨¹ýMSSQLºÍRDPÂùÁ¦¹¥»÷¡¢SMB»òUSB´«²¼µ½ÆäËûÉ豸  £¬ÒÔ¼°Æô¶¯¶à¸ö°æ±¾µÄDDoS¹¥»÷¡£Ä¿Ç°  £¬ºÚ¿ÍÔÚÒÔ75ÃÀÔªµÄ¼ÛÖµÔÚ°µÍøÏúÊ۸ý©Ê¬ÍøÂç¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-oracle-weblogic-flaw-actively-exploited-by-darkirc-malware/


6.FBIºÍDHS°ä²¼ÓйØÕë¶ÔÃÀ¹úÖÇ¿âµÄ¹¥»÷»î¶¯µÄ½áºÏÕ÷ѯ


6.jpg


FBIºÍDHS-CISAÔÚÖܶþ°ä²¼½áºÏÕ÷ѯ  £¬ÖÒ¸æÓйØAPT×éÖ¯Õë¶ÔÃÀ¹úÖÇ¿â×éÖ¯µÄ¹¥»÷»î¶¯¡£APT×éÖ¯ÔÚ¹¥»÷ÖÐʹÓÃÁ˶àÖÖÉøÈëý½é  £¬ÀýÈçÕë¶Ô¹«Ë¾ºÍÓ×ÎÒÕÊ»§µÄÓã²æÊ½µç×ÓÓʼþºÍµÚÈý·½ÐÂÎÅ·þÎñ  £¬ÒÔ¼°ÀûÓÃÒ×Êܹ¥»÷µÄÃæÏòWebµÄÉ豸ºÍÔ¶³ÌÏνÓÖ°ÄÜ¡£³É¹¦¹¥»÷Ö®ºóºÚ¿Í¿ÉÇÔÈ¡Ãô¸ÐÐÅÏ¢  £¬»ñÈ¡Óû§Í´´¦²¢»ñµÃ¶ÔÊܺ¦ÕßÍøÂçµÄÓÆ¾Ã½Ó¼û¡£¸ÃÕ÷ѯ»¹ÁгöÁËÕâ´Î¹¥»÷»î¶¯µÄ¼¼Êõϸ½Ú»ººÍ½â´ëÊ©ÒÔÔ®ÊÖÓйØ×éÖ¯Ó¦¶Ô¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fbi-and-homeland-security-warn-of-apt-attacks-on-us-think-tanks/