ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

°ä²¼¹¦·ò 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉϰ䲼ÉêÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£8ÔÂ12ÈÕ£¬ºÚ¿ÍÍÅ»ïALTDOSÐû³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬Ò»ÏòÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£Í¬ÈÕ£¬OrangeTee¹«Ë¾°µÊ¾Æä²»»áÖ§¸¶Êê½ð¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬°²È«¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþ·þÎñÆ÷ÔÚ´Óǰ¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£ProxyShellÊÇ3¸ö·ì϶CVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£×êÑÐÈËÔ±°µÊ¾£¬ÔÚProxyShell¸ÅÏëÑéÖ¤´úÂë°ä²¼ºó²»¾Ã³öÏÖÁËÓйØÉ¨Ãè»î¶¯£¬Ö±µ½ÉÏÖÜÄ©Ôì³ÉÁËÏÖʵ¹¥»÷¡£´Ë±í£¬Òѱ»ÈëÇÖµÄ1900¶ą̀Exchange·þÎñÆ÷Éæ¼°µ½µÄ×éÖ¯Ô̺¬¹¹ÖþÔì×÷ÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬½¨µêºÍÓ×ÐÍ»ú³¡µÈ¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



×êÑÐÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


×êÑÐÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑǾÓÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£ÔÚÕâ´Î»î¶¯Öй¥»÷ÕßÌáÄܸɱêÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍ²é¿´¡£Ò»µ©Óû§µã»÷Á´½Ó£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÖØÒªÕë¶ÔAndroidÓû§£¬ÓµÓÐÇÔȡ֧¸¶¿¨¾ßÌåÐÅÏ¢¡¢À¹½Ø¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢½Ó¼ûȨÏÞµÈÖ°ÄÜ¡£FlubotÔçÔÚ½ñÄêËêÊ׾͹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¶È£¬²¢ÔÚ±¾ÔÂÆðÍ·Õë¶Ô°Ä´óÀûÑÇÓû§¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬¹ú·À²¿ÍøÂç˾ÁÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ£¬µ«Ëü²¹³ä˵Õâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷ÊǺÎʱ±»·¢ÏÖ£¬µ«×êÑÐÈËÔ±ÒÔΪ£¬¹¥»÷¿ÉÄܲúÉúÔÚ¼¸ÖÜǰ¡£¹úÎñÔº½²»°È˰µÊ¾£¬ËûÃÇÔÚ²ÉÈ¡´ëÊ©ÒÔÈ·±£ÐÅÏ¢Äܹ»Êܵ½±£»¤£¬²¢ÇÒ³öÓÚ°²È«Ô­ÒòÎÞ·¨»áÉ̸ÃÊÂÎñµÄÐÔÖʺÍÁìÓò¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISA°ä²¼½üÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨


CISA°ä²¼½üÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨.png


CISA°ä²¼ÁËÓйؽüÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨¡£¸Ã¾¯±¨Ö¸³ö£¬ÔÚ³Á´óÌìÈ»ÔÖº¦Ö®ºó£¬Ô̺¬¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£»áºÜ³£¼û¡£×éÖ¯ºÍÓ×ÎÒÔÚ´¦ÖôøÓÐÓëì«·çÓйØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱ±ØÒªÓ×ÐÄÉóÉ÷¡£´Ë±í£¬»¹Òª¾¯ÌèÓë¶ñÁÓÆøÏóÊÂÎñÓйصÄÉ罻ýÌåÒªÇó¡¢Îı¾»òÏßÏ»¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco Talos°ä²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨


Cisco Talos°ä²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨.jpg


Cisco Talos°ä²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨¡£»ã±¨Ö¸³ö£¬ÉÏÒ»¼¾¶È£¬ÀÕË÷Èí¼þ³õ´Î²»ÔÙÕ¼¾ÝÖØÒªµØÎ»£¬´§Ä¦Õâ¿ÉÄÜÊÇÓÉMicrosoft Exchange ·ì϶ÀûÓûµÄ´ó·ùÔö³¤µ¼ÖµÄ¡£Ö®ºó£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£©£¬ÓÖ³ÉΪ×î´óµÄÍþв¡£ÆäÖУ¬ÖØÒªµÄÀÕË÷Èí¼þÔ̺¬REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£´Ë±í£¬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬±¾¼¾¶ÈµÄ°²È«¼ì²âÈÆ¹ý¼¼ÊõµÄʹÓÃÓÐËùÔö³¤¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html