È«Çò×î´óÈâÀà³ö²úÉÌJBSÔâµ½¹¥»÷ £¬¶à¸ö·Ö¹«Ë¾Í£²ú£»×êÑÐÍŶӷ¢ÏÖкóÃÅFacefish £¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢

°ä²¼¹¦·ò 2021-06-01

1.È«Çò×î´óÈâÀà³ö²úÉÌJBSÔâµ½¹¥»÷ £¬¶à¸ö·Ö¹«Ë¾Í£²ú


1.jpg


JBSʳƷ¹«Ë¾ÓÚÉÏÖÜÄ©Ôâµ½¹¥»÷ £¬Ó°ÏìÃÀ¹ú¡¢°Ä´óÀûÑǺͼÓÄôóµÈµØµÄ·Ö¹«Ë¾¡£JBSÊÇÈ«Çò×î´óµÄÅ£ÈâºÍ¼ÒÇݳö²úÉÌ £¬Ò²ÊÇÈ«ÇòµÚ¶þ´óÖíÈâ³ö²úÉÌ £¬ÔÚÁù´óÖÞµÄ190¸ö¹ú¶È/µØÓò¶¼ÓÐÒµÎñ¡£Ä¿Ç° £¬°Ä´óÀûÑǵ±¾ÖÒÑ»ñϤÕâÒ»ÊÂÎñ £¬²¢ÔÚÓëJBSºÏ×÷ÊÔͼ¸´Ô­¾³Äڵijö²ú»î¶¯¡£´Ë¿ÌÉв»Ã÷ÏÔÕâ´Î¹¥»÷µÄÐÔÖʵȾßÌåÐÅÏ¢ £¬ÓÉÓÚ¹¥»÷²úÉúÓÚÖÜÄ© £¬Òò¶ø×êÑÐÈËÔ±´§¶È¼«ÓпÉÄÜÓëÀÕË÷Èí¼þÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/food-giant-jbs-foods-shuts-down-production-after-cyberattack/


2.°Ä´óÀûÑÇBLK Sport³ÆÆäÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷


2.jpg


°Ä´óÀûÑÇBLK Sport°ä²¼ÉêÃ÷ £¬³ÆÆäÄÚ²¿·þÎñÆ÷ÓÚ2021Äê4ÔÂ21ÈÕÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷ £¬¿Í»§ÐÅÏ¢ÒѾ­Ð¹Â¶¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬¿Í»§ÐÅÏ¢ £¬ÈçÃû³Æ¡¢µØÖ·¡¢ÁªÏµ·½Ê½¡¢ºÏͬÐÅÏ¢ºÍ¶©µ¥ÐÅÏ¢µÈ£»ÒÔ¼°¹©¸øÉÌÐÅÏ¢ £¬È繫˾ºÍ·þÎñÈËÔ±Ãû³Æ¡¢µØÖ·¡¢ÁªÏµ·½Ê½¡¢ºÏͬÐÅÏ¢¡¢¶©µ¥ÐÅÏ¢ºÍÒøÐÐÕÊ»§ÐÅÏ¢µÈ¡£¸Ã¹«Ë¾Ç¿Å²Óû§µÄÕ˺źÍÃÜÂë £¬ÒÔ¼°ÐÅÓþ¿¨ºÅµÈ²ÆÕþÐÅÏ¢²¢Î´Ð¹Â¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/au-blk-sport-reveals-darkside-attack/


3.×êÑÐÍŶӷ¢ÏÖкóÃÅFacefish £¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢


3.jpg


×êÑÐÍŶӷ¢ÏÖÁËÒ»¸öеĺóÃÅFacefish £¬¿É½ÚÔìLinuxϵͳ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£FacefishÓÉDropperºÍRootkitÁ½²¿ÃÅ×é³É £¬ÆäÖØÒªÖ°ÄÜÓÉRootkitÄ£¿éÈ·¶¨ £¬¸ÃÄ£¿éÔÚRing3²ã¹¤×÷ £¬²¢Ê¹ÓÃLD_PRELOADÖ°ÄܽøÐмÓÔØ¡£¸Ã¶ñÒâÈí¼þÖ§³Ö¶àÖÖÖ°ÄÜ £¬Ô̺¬:ÉÏ´«É豸ÐÅÏ¢¡¢ÇÔÈ¡Óû§Æ¾Ö¤¡¢µ¯»ØshellºÍÖ´ÐÐËÁÒâºÅÁî¡£´Ë±í £¬×êÑÐÈËÔ±°µÊ¾FacefishѡȡÁ˸´ÔÓµÄͨѶºÍ̸ºÍ¼ÓÃÜËã·¨ £¬ËüʹÓÃÒÔ0x2XX¿ªÍ·µÄÖ¸ÁîÀ´»¥»»¹«Ô¿ £¬²¢Ê¹ÓÃBlowFishÓëC2·þÎñÆ÷¼ÓÃÜͨѶÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118388/malware/facefish-backdoor.html


4.×êÑÐÍŶӷ¢ÏÖ¶à¸ö¿ÉϰȾPulse Secure VPNµÄ¶ñÒâÈí¼þ


4.jpg


Fireeye×êÑÐÍŶӷ¢ÏÖÁ˶à¸ö¿ÉϰȾPulse Secure VPNÉ豸µÄ¶ñÒâÈí¼þ¼Ò×å¡£ÕâЩ¶ñÒâÈí¼þÀûÓõķìÏ¶ÖØÒªÊÇÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2021-22893£© £¬CVSSÆÀ·ÖΪ10 £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÖ´ÐÐËÁÒâ´úÂë¡£½ØÖÁĿǰ £¬ÒÑ·¢ÏÖÁË16¸ö´ËÀà¶ñÒâÈí¼þ £¬Ô̺¬ÓÃÓÚ½âÎöPSCÈÕÖ¾ÎļþµÄBloodmine¡¢ÇÔȡʹ´¦µÄBloodbank¡¢ÄÚ´æ²¹¶¡¹¤¾ßCleanpulseºÍWeb shell RapidpulseµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-find-four-new-malware-tools-created-to-exploit-pulse-secure-vpn-appliances/


5.Imperva°ä²¼ÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄ·ÖÎö»ã±¨


5.jpg


Imperva°ä²¼ÁËÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄ·ÖÎö»ã±¨ £¬Éæ¼°17¸ö¹ú¶ÈµÄ19¸öÐÐÒµµÄ1200ÃûIT°²È«×¨ÒµÈËÔ±¡£»ã±¨Ö¸³ö £¬È¥Äê £¬86£¥µÄ×éÖ¯Ôâµ½ÁËÍøÂç¹¥»÷ £¬ÆäÖÐ69£¥µÄ×éÖ¯Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬¶ø57£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£»´«Í³ÐÐÒµµÄIT°²È«Ô¤ËãÔö³¤ÁË4£¥ £¬87£¥µÄ×éÖ¯Óöµ½ÁËIT°²È«ÈËԱǷȱµÄÎÊÌ⣻ËÄ·ÖÖ®ÈýµÄ×éÖ¯½«ÔÚÃ÷ÄêÖ´ÐÐSD-WAN¡¢ÁãÐÅÀµÍøÂç½Ó¼û£¨ZTNA£©ºÍ°²È«½Ó¼û·þÎñ±ßÔµ£¨SASE£©¼¼Êõ¡£


Ô­ÎÄÁ´½Ó£º

https://www.imperva.com/resources/resource-library/reports/2021-cyberthreat-defense-report/


6.Perimeterx°ä²¼2020ÄêµçÉÌڲƭ»î¶¯µÄ·ÖÎö»ã±¨


6.jpg


Perimeterx°ä²¼ÁË2020ÄêµçÉÌڲƭ»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö £¬Õë¶Ôµç×ÓÉÌÎñÁãÊÛÉ̵Äڲƭ¹¥»÷ÔÚÊýÁ¿¡¢ÆµÂʺ͸´ÔÓˮƽÉ϶¼ÓÐËùÔö³¤¡£2020Äê4Ô £¬¶Ô¸¶¿îƽ̨µÄ¹¥»÷Ôö³¤ÁË69%£»ÔÚÏÞÁ¿°æ»î¶¯Ð¬ÏúÊÛ¶¥·åÆÚ¼ä £¬»ÆÅ£botÌáÒéÁ˳¬¹ý40%µÄ¹ºÎïÒªÇó£»ÔÚ9Ô·Ý £¬85%µÄµÇ¼ÊÇATO³¢ÊÔ £¬¶ø×èÈûÁ÷Á¿µÄ·åֵˮƽÔÚËĸöÔÂÄÚ³¬¹ýÁË95£¥£»2020Äê £¬ÃÀ¹úÿ¸öÖØÒªµÄ¼ÙÆÚ¶¼²úÉúÀñÎ│ڲƭÊÂÎñ¡£


Ô­ÎÄÁ´½Ó£º

https://www.perimeterx.com/resources/reports/automated-fraud-benchmark-report-e-commerce-edition/