Akamai DNSÈ«ÇòÁìÓòÖжϣ¬SteamºÍAWSµÈÍøÕ¾Ì±»¾£»¶ñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢
°ä²¼¹¦·ò 2021-07-23
±¾ÖÜËÄAkamai DNSÔÚÈ«ÇòÁìÓòÄÚ²úÉú·þÎñÖжϣ¬Ó°ÏìÁËSteam¡¢PlayStation Network¡¢AWS¡¢ÑÇÂíÑ·¡¢¹È¸èºÍSalesforceµÈÍøÕ¾¡£¾µ÷²é£¬Õâ´ÎÖжÏÊÇÓÉÓÚEdge DNS·þÎñÖеÄÎÊÌâµ¼Öµġ£¸Ã¹«Ë¾°µÊ¾£¬ÔÚ7ÔÂ22ÈÕ15:46UTC£¬Ò»´ÎÈí¼þÅäÖøüе¼ÖÂÁËDNSϵͳÖгöÏÖÃýÎó£¬ÖжϳÖÐøÁ˳¤´ïÒ»¸öÓ×ʱ£¬ÔڻعöÈí¼þÅäÖøüк󣬷þÎñ¸´ÔÁËÕý³£ÔËÐС£Akamai³ÆÆäÄܹ»È·ÈÏÕâ²»ÊÇÕë¶ÔAkamaiƽ̨µÄÍøÂç¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/akamai-dns-global-outage-takes-down-major-websites-online-services/
2.жñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢

Check Point×êÑÐÈËÔ±Åû¶Ð¶ñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢¡£XLoaderÔ´×ÔÕë¶ÔWindowsµÄÐÅÏ¢ÇÔÈ¡·¨Ê½Formbook£¬ÓÚÈ¥Äê2Ô³õ´Î³öÏÖ²¢Ô½À´Ô½ÊÜÓ½Ó£¬ÊÇÒ»ÖÖûÓÐÒÀÀµÏîµÄ¿çƽ̨£¨WindowsºÍmacOS£©½©Ê¬ÍøÂç¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ»¹¼«¶ÈÁ®¼Û£¬macOS°æ±¾½öÊÛ49ÃÀÔª¶øWindows°æ±¾59ÃÀÔª¡£×êÑÐÈËÔ±³Æ£¬ÔÚ2020Äê12ÔÂ1ÈÕÖÁ2021Äê6ÔÂ1ÈÕÆÚ¼ä£¬¼ì²âµ½ÁËÀ´×Ô69¸ö¹ú¶ÈºÍµØÓòµÄFormbook/XLoaderÒªÇ󣬯äÖдó²¿ÃÅÀ´×ÔÃÀ¹ú (53%)¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/xloader-malware-steals-logins-from-macos-and-windows-systems/
3.·¨¹úANSSIÅû¶APT31ÀûÓüÒͥ·ÓÉÆ÷ÌáÒéµÄ¼äµý»î¶¯

·¨¹ú¹ú¶ÈÍøÂ簲ȫ»ú¹¹ANSSIÅû¶APT31£¨»òZirconium£©ÀûÓüÒͥ·ÓÉÆ÷ÌáÒéµÄ¼äµý»î¶¯¡£¸Ã»ú¹¹°µÊ¾£¬Õâ´Î¹¥»÷ÆðÍ·ÓÚ2021ËêÊ×£¬²¢ÇÒ´Ë¿ÌÈÔÔÚ½øÐÐÖС£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷Õß½Ù³ÖÁ˼Òͥ·ÓÉÆ÷ÒÔÉèÖÃÊÜϰȾÉ豸µÄ´úÀíÍøÂ磬ּÔÚ°µ²ØÆä¿úËź͹¥»÷»î¶¯¡£´Ë±í£¬ANSSI»¹°ä²¼ÁËÕâЩ¹¥»÷µÄÈëÇÖÖ¸±ê(IOC)ÁÐ±í£¬²¢°ä²¼ÁËÕâ´Î¹¥»÷Öб»APT31½Ù³ÖµÄ161¸öIPµØÖ·µÄÁÐ±í¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/chinese-hacking-group-apt31-uses-mesh-of-home-routers-to-disguise-attacks/
4.2¸ö¶ñÒâNPM°üÀûÓÃChromePass·¨Ê½´Óä¯ÀÀÆ÷ÇÔȡʹ´¦

ReversingLabsÅû¶ÁË2¸ö¶ñÒâNPM°ü£¬Äܹ»ÀûÓÃChromePass·¨Ê½´Óä¯ÀÀÆ÷ÇÔȡʹ´¦¡£ÕâÁ½¸öNPM°ü±ðÀëΪnodejs_net_serverºÍtemptesttempfile£¬×ÜÏÂÔØÁ¿Òѳ¬¹ý2000´Î¡£ÆäÖÐǰÕß×Ô2019Äê2Ô³õ´Î°ä²¼ÒÔÀ´£¬ÒѾ¹ýÁË12¸ö°æ±¾£¬Æä¿ª·¢ÕßchrunleeËÆºõÒ²ÊÇGitHubÉϵĻîÔ¾¿ª·¢ÈËÔ±£»¶øºóÕßµÄÓйØÐÅÏ¢ÔòÉٵöࡣReversingLabsÓÚ7ÔÂ2ÈÕÁªÏµÁËnpm°²È«ÍŶӣ¬´Ë¿ÌÕâÁ½¸öÈí¼þ°ü¶¼Òѱ»É¾³ý¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/npm-package-steals-chrome-passwords/168004/
5.CISAÔÚ±»¹¥»÷µÄPulse SecureÉ豸Öз¢ÏÖ13¸ö¶ñÒâÑù±¾

ÃÀ¹úCISA°ä²¼¾¯±¨£¬³ÆÔÚ±»¹¥»÷µÄPulse SecureÉ豸ÉÏ·¢ÏÖÁË13¸ö¶ñÒâÈí¼þÑù±¾¡£×Ô2020Äê6ÔÂÒÔÀ´£¬ÃÀ¹úµ±¾Ö»ú¹¹¡¢¹Ø¼ü»ù´¡ÉèÊ©ºÍ¸÷ÐÐÒµ¹«Ë¾µÄPulse SecureÉ豸һÏòÊǹ¥»÷ÕßµÄÖ¸±ê£¬¹¥»÷ÕßÀûÓöà¸ö·ì϶£¨CVE-2019-11510¡¢CVE-2020-8260¡¢CVE-2020-8243ºÍCVE-2021-2289£©ÈëÇÖ²¢×°ÖÃwebshell¡£CISA¼¤ÀøÓû§ºÍÖÎÀíÔ±²é¿´Õâ13¸ö¶ñÒâÈí¼þµÄ·ÖÎö»ã±¨(MAR)£¬Ïàʶ¹¥»÷Õߵļ¼Êõ¡¢Õ½ÊõºÍ·¨Ê½(TTP)ÒÔ¼°ÈëÇÖÖ¸±ê(IOC)¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/07/21/malware-targeting-pulse-secure-devices
6.ºÚ¿Íbl4ckt0rÏúÊÛÒâ´óÀûTicketClub 34ÍòÓû§ÐÅÏ¢

2021Äê7ÔÂ19ÈÕ£¬ºÚ¿Íbl4ckt0rÔÚºÚ¿ÍÂÛ̳RaidForumsÉÏÏúÊÛTicketClub³¬¹ý340957Óû§µÄÐÅÏ¢¡£TicketClubÊÇÒ»¼ÒÒâ´óÀû¹«Ë¾£¬ÖØÒªÎªÏßϹºÎïÌṩÓÅ»Ýȯ£¬ËûÃǵĿͻ§Ô̺¬ºº±¤Íõ¡¢Âóµ±ÀͺÍRainbow MagiclandµÈ¡£7ÔÂ22ÈÕ£¬¸Ã¹«Ë¾µÄºÜ¶àÓû§»ã±¨³ÆÍøÕ¾ÎÞ·¨½Ó¼û¡£ÖµµÃÒ»ÌáµÄÊÇ£¬¸Ã¹«Ë¾ÔÚ2020Äê4ÔÂÒ²¾Àú¹ýÀàËÆÊÂÎñ£¬µ¼ÖÂ203859·â¿Í»§µÄµç×ÓÓʼþй¶¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/120406/data-breach/ticketclub-italy-data-leak.html


¾©¹«Íø°²±¸11010802024551ºÅ