Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯
°ä²¼¹¦·ò 2022-03-03Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯
2ÔÂ28ÈÕ£¬Symantec°ä²¼Ò»·Ý»ã±¨ÏêÊöÁËSlugÍÅ»ïÀûÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯¡£DaxinÊÇÒ»¸öWindowsÄÚºËÇý¶¯·¨Ê½£¬×Ô2019Äê11ÔÂÆðÍ·±»ÓÃÓÚ¹¥»÷»î¶¯£¬×êÑÐÈËÔ±ÔÚ2021Äê11Ô¹۲쵽Æä×î½üÒ»´Î¹¥»÷»î¶¯£¬Õë¶ÔµçÐÅ¡¢½»Í¨ºÍÔì×÷ÐÐÒµ¡£¸ÃºóÃÅÓµÓÐÇÔÈ¡Êý¾Ý¡¢Ö´ÐкÅÁî»òÏÂÔØºÍ×°ÖÃÆäËü¶ñÒâÈí¼þµÄÖ°ÄÜ£»Äܹ»½Ù³ÖºÏ·¨µÄTCP/IPÏνӽøÐÐͨѶ£¬ÒÔÈÆ¹ý¼ì²â£»»¹ÄÜÔÚÖ¸±êÖÐ×°ÖÃÆäËü×é¼þÀ´¼ÓÇ¿ÄÚÖÃÖ°ÄÜ£¬²¢Ê¹ÓÃÃûΪ\\.\Tcp4µÄÉ豸Ϊ´ËÀà×é¼þÌṩרÓÃͨѶ»úÔì¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage
¼ÑÄܵÄ×Ó¹«Ë¾AxisÔâµ½¹¥»÷µ¼Ö²¿ÃÅϵÍÂäÙʱÖжÏ
¾ÝýÌå2ÔÂ28ÈÕ±¨Â·£¬Èðµä¹«Ë¾Axis CommunicationsÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅϵͳÖжϡ£AxisÊǼÑÄܵÄ×Ó¹«Ë¾£¬2019Äê½»Ò×ÊÕÈ볬¹ý12.35ÒÚÃÀÔª¡£¹¥»÷²úÉúÓÚ2021Äê2ÔÂ20ÈÕ£¬¸Ã¹«Ë¾µ±¼´¶Ô´ËÊ·¢Õ¹µ÷²é¡£µ÷²éÓÚ2ÔÂ27ÈÕʵÏÖ£¬Á˾ÖÏÔʾûÓзþÎñÆ÷±»¼ÓÃÜ£¬Ò²Ã»Óпͻ§ÐÅÏ¢Êܵ½Ó°Ï죬¹¥»÷Õßͨ¹ýÉ繤¹¥»÷½ÚÔìÁËÒ»ÃûÔ±¹¤µÄÕË»§£¬²¢ÔÚûÓд¥·¢Èκξ¯±¨µÄÇé¿öÏÂÈëÇÖÁËϵͳ¡£Ä¿Ç°£¬¸Ã¹«Ë¾µÄ²Ù×÷ϵͳºÍÀûÓ÷¨Ê½ÈÔ´¦ÓÚÀëÏß״̬£¬Camera StationÐí¿ÉϵͳҲÎÞ·¨Ê¹Óá£
https://www.bleepingcomputer.com/news/security/axis-communications-shares-details-on-disruptive-cyberattack/
CISA°ä²¼Éæ¼°Ê©ÄÍµÂµçÆøÖжà¸ö·ì϶µÄICS°²È«¹«¸æ
CISAÓÚ2ÔÂ24ÈÕ°ä²¼ÁËÒ»ÔòICS°²È«¹«¸æ£¬Éæ¼°Ê©ÄÍµÂµçÆøEasergyÖеĶà¸ö·ì϶¡£ÕâЩ·ì϶Ô̺¬Ó²±àÂëÆ¾Ö¤Ê¹Ó÷ì϶£¨CVE-2022-22722£©»ººÍ³åÇøÒç¶Âí½Å£¨CVE-2022-22723ºÍCVE-2022-22725£©¡£¹«¸æ³Æ£¬³É¹¦ÀûÓÃÕâЩ·ì϶¿ÉÄÜ»áй¶É豸ʹ´¦¡¢µ¼ÖÂDoS״̬¡¢É豸³ÁÆô»òÔÊÐí¹¥»÷Õ߯ëÈ«½ÚÔìÖм̡£Ê©ÄÍµÂµçÆøÔÚ2022Äê1ÔÂ11ÈÕÍÆ³öµÄ¸üÐÂÖн¨¸´ÁËÕâЩ·ì϶¡£
https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-03
ÒÁÀÊUNC3313ÀûÓÃ2¸öкóÃŹ¥»÷Öж«µÄijµ±¾Ö»ú¹¹
MandiantÔÚ2ÔÂ24ÈÕ°ä²¼µÄ»ã±¨Åû¶ÁËÒÁÀÊUNC3313ʹÓõÄ2¸öкóÃŵÄϸ½Ú¡£×êÑÐÈËÔ±ÔÚ2021Äê11Ô¼ì²âµ½UNC3313Õë¶ÔÖж«Ä³µ±¾Ö»ú¹¹µÄ¹¥»÷£¬²¢ÔÚµ÷²é¹ý³ÌÖз¢ÏÖÁËеĶñÒâÈí¼þGRAMDOORºÍSTARWHALE¡£ÆäÖУ¬STARWHALEÊÇÒ»¸öWindows¾ç±¾Îļþ(.WSF)£¬Ö´ÐдÓÓ²±àÂëC2·þÎñÆ÷½Ó¹Üµ½µÄºÅÁGRAMDOOR±»²¿ÊðΪNSIS×°Ö÷¨Ê½£¬²¢Í¨¹ýÉèÖÃWindows Run×¢²á±íÏîʵÏÖÓÆ¾ÃÐÔ¡£
https://www.mandiant.com/resources/telegram-malware-iranian-espionage
¼ÓÖÝÂÉʦлáState BarµÄ26ÍòÆð°¸¼þ¼Í¼й¶
ýÌå2ÔÂ28ÈÕ±¨Â·³Æ£¬¼ÓÀû¸£ÄáÑÇÖÝÂÉʦлáState BarÔ¼26Íò·Ý·Ç¹«¿ªµÄ°¸¼þ¼Í¼±»°ä²¼ÔÚJudyrecords.com¡£¸Ã¾ÛºÏÍøÕ¾´Ó¶à¸ö˾·¨»ú¹¹Êý¾Ý¿âÍøÂ繫¿ªµÄ·¨Í¥¼Í¼£¬»ã¼¯Á˳¬¹ý6.3Òڷݼͼ¡£¾ÝϤ£¬Õâ´Îй¶ÊÂÎñÔ´ÓÚ°¸¼þÖÎÀíϵͳÖдæÔÚÒ»¸ö°²È«·ì϶£¬µ¼ÖÂJudyrecordsÔÚ½Ó¼û¹«¹²¼Í¼ʱÎÞÒâÖÐץȡµ½Á˷ǹ«¿ª¼Í¼¡£Ä¿Ç°£¬ÕâЩÎļþÒѱ»´ÓÍøÕ¾ÖÐɾ³ý¡£
https://www.theregister.com/2022/02/28/ca_legal_leak/
Akamai·¢ÏÖÐÂDDoS¹¥»÷ģʽ¿É·Å´ó65±¶
3ÔÂ1ÈÕ£¬Akamai°ä²¼»ã±¨³Æ¼ì²âµ½ÐÂDDoS¹¥»÷ģʽTCP Middlebox Reflection¿É·Å´ó65±¶¡£´ËÀ๥»÷Õë¶ÔÊý¾Ý°ü²é³ºÍÄÚÈݹýÂËÉ豸£¬ÓµÓÐ33×Ö½ÚpayloadµÄSYNÊý¾Ý°ü¿É´¥·¢2156×Ö½ÚµÄÏìÓ¦£¬·Å´óÁË6533%¡£AkamaiÔÚÕë¶ÔÒøÐÓ×¢ÓÎÀÀ¡¢ÓÎÏ·¡¢Ã½ÌåºÍWeb ÍйܷþÎñÌṩÉ̵ĻÖж¼¼ì²âµ½ÁË´ËÀ๥»÷¡£×êÑÐÈËÔ±ÒÔΪ£¬Ö»¹ÜĿǰ´ËÀ๥»÷µÄ¹æÄ£ÉÐС£¨·åֵΪ11GbpsºÍ1.5Mpps£©£¬µ«¹¥»÷ÕßÔÚ½øÐÐ΢µ÷ºóÕÒµ½×î¼Ñ·´ÉäģʽֻÊǹ¦·òÎÊÌâ¡£
https://www.akamai.com/blog/security/tcp-middlebox-reflection#.Yh41hIhUsH0.twitter
°²È«¹¤¾ß
Katoolin3
Äܹ»½« Kali Linux ÖпÉÓõÄËùÓз¨Ê½´øµ½ Debian ºÍ Ubuntu¡£
https://github.com/s-h-3-l-l/katoolin3
openSquat
ÊÇÒ»ÖÖ¿ªÔ´µý±¨ (OSINT) °²È«¹¤¾ß£¬ÓÃÓÚ¼ø±ð¶ÔÌØ¶¨¹«Ë¾»òÓòµÄÇÀ×¢Íþв¡£
https://github.com/atenreiro/opensquat
CloudGraph
ÊǺÏÓÃÓÚ AWS¡¢Azure¡¢GCP ºÍ K8s µÄÃâ·Ñ¿ªÔ´Í¨Óà GraphQL API ºÍÔÆ°²È«×´Ì¬ÖÎÀí (CSPM) ¹¤¾ß¡£
https://github.com/cloudgraphdev/cli
Nimcrypt2
Óà Nim ±àдµÄ .NET¡¢PE ºÍÔʼ Shellcode ´ò°ü·¨Ê½/¼ÓÔØ·¨Ê½¡£
https://github.com/icyguider/Nimcrypt2
moonwalk
ͨ¹ýÔÚϵͳÈÕÖ¾ºÍÎļþϵͳ¹¦·ò´ÁÉ϶ϸùºÛ¼££¬ÔÚ Linux ·ì϶ÀûÓÃ/ÉøÈë²âÊÔÆÚ¼ä¸²¸Ç×ÙÓ°¡£
https://github.com/mufeedvh/moonwalk
°²È«·ÖÎö
ÎÚ¿ËÀ¼×êÑÐÈËÔ±ÐÂäįÕË÷Èí¼þ Conti µÄÔ´´úÂë
https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/
ÀÕË÷Èí¼þ BlackCat ·ÖÎö»ã±¨
https://cybersecurity.att.com/blogs/labs-research/blackcat-ransomware
Namecheap ÖÕֹΪ¶íÂÞ˹×éÖ¯Ìṩ·þÎñ£¬ÒªÇóËûÃÇ×ªÒÆÓòÃû
https://www.bleepingcomputer.com/news/technology/namecheap-terminates-services-for-russians-asks-them-to-move-domains/
΢Èí£ºÎÚ¿ËÀ¼ÔÚÈëÇÖǰÊýÓ±¾Ç®ÍÔâ·êÁËÐ嵀 FoxBlade ¶ñÒâÈí¼þ¹¥»÷
https://securityaffairs.co/wordpress/128538/cyber-warfare-2/foxblade-malware-used-hours-before-invasion.html
CISAºÍFBÖÒ¸æÕë¶ÔÎÚ¿ËÀ¼µÄÊý¾Ý²Á³ý¹¥»÷¿ÉÄÜ»áÊæÕ¹µ½ÆäËü¹ú¶È
https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-potential-data-wiping-attacks-spillover/
Emotet µÄ³ÁÉú£º½©Ê¬ÍøÂçµÄÐÂÖ°Äܼ°Æä¼ì²â²½Öè
https://thehackernews.com/2022/02/reborn-of-emotet-new-features-of-botnet.html


¾©¹«Íø°²±¸11010802024551ºÅ