ºÚ¿ÍÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеĺóÃÅ£»Cisco Talos·¢ÏÖAPT×éSideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹

°ä²¼¹¦·ò 2021-07-09

1.ºÚ¿ÍÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеĺóÃÅ


1.jpg


Malwarebytes×êÑÐÈËÔ±·¢ÏÖºÚ¿ÍÕýÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеÄCobalt StrikeºóÃÅ¡£Õâ´Î»î¶¯ÖеĶñÒâÓʼþÔ̺¬Ò»¸öÃûΪSecurityUpdates.exeµÄ¸½¼þ £¬ÒÔ¼°Ò»¸ö¼Ù×°³É΢Èí°²È«¸üеÄÁ´½Ó¡£Ä¿Ç°¹ÌÈ»Malwarebytes»¹Ã»ÓÐÈ·¶¨Õâ´Î´¹µö»î¶¯±³ºóµÄÖ÷ÕÅÊÇʲô £¬µ«ÓÐȤµÄÊÇ £¬Õâ¸öCobalt Strike payloadÍйÜÔÚÒ»¸öÖ¼ÔÚ·Ö·¢DridexÒøÐÐľÂíµÄ»î¶¯Ê¹ÓõÄIPµØÖ·ÉÏ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-kaseya-vsa-security-update-backdoors-networks-with-cobalt-strike/


2.Cisco Talos·¢ÏÖAPT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹


2.jpg


Cisco Talos·¢ÏÖÁËAPT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡£¸ÃAPTÖÁÉÙ×Ô2019ÄêÒÔÀ´¾ÍÆðÍ·»îÔ¾ £¬ËƺõÒ»ÏòרһÓÚÍøÂç¼äµý»î¶¯¡£SideCopyµÄϰȾÁ´Ê¼ÓÚÒ»¸ö¶ñÒâLNKÎļþ £¬¶øºóÉæ¼°¶à¸öHTAºÍ¼ÓÔØ·¨Ê½DLLÒÔÌṩ×îÖÕµÄpayload¡£Talos³Æ £¬SideCopyµÄ¹¥»÷»î¶¯ÒÑ´Ó×°ÖûùÓÚC#µÄCetaRAT¡¢AllakoreľÂíºÍnjRAT £¬À©´óµ½Ê¹ÓÃ4¸öÐµĶ¨ÔìľÂíºÍ2¸öÉÌÓÃRATLilithºÍEpicenter¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/sidecopy-cybercriminals-use-custom-trojans-in-india-attacks/


3.×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öNuGetÈí¼þ°ü´æÔÚÒ×±»ÀûÓõķì϶


3.jpg


ReversingLabsµÄ×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öNuGetÈí¼þ°ü´æÔÚÒ×±»ÀûÓõķì϶¡£NuGetÊÇMicrosoftÖ§³ÖµÄ.NETƽ̨»úÔì £¬×÷ΪÖÎÀíÆ÷ £¬Ö¼ÔÚʹ¿ª·¢ÈËÔ±¿ÉÄܹ²Ïí¿É³ÁÓõĴúÂë¡£×êÑÐÈËÔ±¶ÔÍйÜÔÚNuGet´æ´¢¿âÉϵÄÈí¼þ°üµÄ½øÐзÖÎö £¬·¢ÏÖÓÐ51¸öÈí¼þ°üÒ×Êܵ½¸ßÑϳÁÐÔ·ì϶µÄ¹¥»÷ £¬ÀýÈçÔ¶³Ì·þÎñÆ÷ÎļþÖÎÀí¿âWinSCPHelper £¬Ê¹ÓÃÁËWinSCP°æ±¾5.11.2 £¬´æÔÚËÁÒâ´úÂëÖ´Ðзì϶(CVE-2021-3331)¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/07/dozens-of-vulnerable-nuget-packages.html


4.ÃÀ¹úÑÇÀ­°ÍÂíÖÝWiregrassµçÁ¦¹«Ë¾³ÆÔâµ½ÀÕË÷¹¥»÷


4.jpg


ÃÀ¹úÑÇÀ­°ÍÂíÖݵĵçÁ¦¹«Ë¾Wiregrass³ÆÔâµ½ÀÕË÷¹¥»÷¡£¸Ã¹«Ë¾³Æ £¬ÆäÔÚÉÏÖÜÁù·¢ÏÖÁËÕâ´Î¹¥»÷ £¬¸Ã¹¥»÷Ö»Ó°ÏìÁËһ̨·þÎñÆ÷ £¬µ¼ÖÂÆä¿Í»§ÁÙʱÎÞ·¨½Ó¼ûÕÊ»§ £¬ÆäÕýÖÂÁ¦¸´Ô­ÊÜÓ°ÏìµÄϵͳ¡£µ«ÊÇĿǰÉÐδ·¢ÏÖ´æÔÚÊý¾Ýй¶ÎÊÌâ £¬¹©µç·þÎñҲδÊܵ½Ó°Ïì £¬¶ø¸Ã¹«Ë¾Ã»Óа´ÒªÇóÖ§¸¶Êê½ð¡£´Ë±í £¬¸Ã¹«Ë¾°µÊ¾ £¬ÆäÔÚ¹¥»÷²úÉúǰµÄÒ»ÖÜÉý¼¶ÁËÍÆËã»úϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/119827/cyber-crime/wiregrass-electric-cooperative-attack.html


5.Rapid7×êÑÐÈËÔ±Åû¶Sage X3 ERPƽ̨ÖеĶà¸ö·ì϶


5.jpg


Rapid7µÄ×êÑÐÈËÔ±Åû¶Sage X3ÆóÒµ×ÊÔ´¹æ»®(ERP)ƽ̨ÖеÄ4¸ö·ì϶¡£ÆäÖÐ×îΪÑϳÁµÄÊÇÔ¶³ÌºÅÁîÖ´Ðзì϶£¨CVE-2020-7388£© £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ×î¸ßµÄNT AUTHORITY/SYSTEMÓû§È¨ÏÞÔÚ·þÎñÆ÷ÉÏÖ´ÐкÅÁî¡£ÆäËûΪÐÅϢй¶·ì϶£¨CVE-2020-7387£©¡¢Éí·ÝÑéÖ¤²»¼°·ì϶£¨CVE-2020-7389£©ºÍÓÆ¾ÃÐÔ¿çÕ¾¾ç±¾·ì϶£¨CVE-2020-7390£©¡£ÆäÖÐ £¬½áºÏʹÓÃCVE-2020-7387ºÍCVE-2020-7388¿ÉÆëÈ«½ÚÔìÖ¸±êϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/critical-sage-x3-rce-bug-allows-full-system-takeovers/167612/


6.Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäÔâµ½¹¥»÷¿Í»§ÐÅϢй¶


6.jpg


Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäµÚÈý·½¹©¸øÉ̵ÄAccellion FTAÔâµ½¹¥»÷ £¬µ¼ÖÂÊý¾Ýй¶¡£Morgan StanleyÊÇÒ»¼Òµ±ÏȵĽðÈÚ·þÎñ¹«Ë¾ £¬ÔÚÈ«ÇòÁìÓòÄÚÌṩͶ×ÊÒøÐÓע֤ȯ¡¢²Æ¸»ºÍͶ×ÊÖÎÀí·þÎñ¡£ÎªÆäÌṩÕË»§ÊØ»¤·þÎñµÄ¹©¸øÉÌGuidehouseÓÚ2021Äê1Ô·ÝÔâµ½¹¥»÷ £¬²¢ÓÚ5Ô½«´ËÊÂ֪ͨÁËÕâ¼ÒͶ×ʹ«Ë¾¡£Õâ´Îй¶ÐÅÏ¢Ô̺¬Æä¿Í»§µÄÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂëºÍ·¨È˹«Ë¾Ãû³ÆµÈ¡£´Ë±í £¬¸Ã¹«Ë¾µÄһЩ¼ÓÃÜÎļþÁ¬Í¬½âÃÜÃÜÔ¿¶¼Ò»Â·±»µÁ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/morgan-stanley-reports-data-breach-after-vendor-accellion-hack/