GoogleºÍMetaÒò¼Óº¦ÒþÖÔȨ±»º«¹ú·£¿î7200ÍòÃÀÔª

°ä²¼¹¦·ò 2022-09-16
1¡¢GoogleºÍMetaÒò¼Óº¦ÒþÖÔȨ±»º«¹ú·£¿î7200ÍòÃÀÔª

      

¾ÝýÌå9ÔÂ14ÈÕ±¨Â·£¬º«¹úÓ×ÎÒÐÅÏ¢±£»¤Î¯Ô±»á(PIPC)Òò¼Óº¦ÒþÖÔ£¬¶ÔGoogle´¦ÒÔ692ÒÚº«Ôª£¨5000ÍòÃÀÔª£©·£¿î£¬¶ÔMeta´¦ÒÔ308ÒÚº«Ôª£¨2200ÍòÃÀÔª£©·£¿î¡£PIPC°µÊ¾£¬ÕâÁ½¼Ò¹«Ë¾ÔÚÍøÂçÓû§Ê¹ÓÃ×Ô¼ºÆ½Ì¨ÒÔ±íµÄÆäËûÍøÕ¾»ò·þÎñµÄÔÚÏ߻µÄÐÅϢʱ£¬Ã»ÓÐÃ÷È··î¸æÓû§»ò»ñµÃËûÃǵÄÔ޳ɡ£ÕâЩÊý¾Ý±»ÓÃÀ´·ÖÎöËûÃǵÄÐËÖ£¬²¢ÍÆË͸öÐÔ»¯µÄ¸æ°×¡£Õâ´Î·£¿îÊǺ«¹úÓÐÊ·ÒÔÀ´¶ÔÎ¥·´ÒþÖÔ·¨µÄ×î´ó´¦·££¬Á½¼Ò¹«Ë¾¶¼±ç²µÁËίԱ»áµÄµ÷²éÁ˾Ö£¬Meta°µÊ¾¿ÉÄÜ»áÔÚ·¨Í¥ÉÏ¶ÔÆä·£¿îÌá³öÖÊÒÉ¡£


https://www.theregister.com/2022/09/14/google_and_meta_fined_over/


2¡¢SparklingGoblinÀûÓÃеÄLinuxºóÃŹ¥»÷ѧÊõÁìÓò×éÖ¯

      

ESETÔÚ9ÔÂ14ÈÕй©Æä·¢ÏÖÁËSideWalkºóÃŵÄLinux±äÌå¡£ÕâÊÇSparklingGoblinʹÓõĶà¸ö×Ô½ç˵ֲÈ뷨ʽ֮һ£¬ÓÚ2021Äê2Ô±»ÓÃÀ´¹¥»÷ÖйúÏã¸ÛµÄÒ»Ëù´óѧ¡£×êÑÐÈËÔ±°µÊ¾£¬¸ÃÍÅ»ï³Ö¾ÃÒÔÀ´Ò»ÏòÒԸôóѧΪָ±ê£¬³É¹¦ÈëÇÖÁ˶à¸öÖ÷Ìâ·þÎñÆ÷£¬Ô̺¬´òÓ¡·þÎñÆ÷¡¢µç×ÓÓʼþ·þÎñÆ÷ºÍÓÃÓÚÖÎÀíѧÉúÈÕ³ÌÆÌÅźͿγÌ×¢²áµÄ·þÎñÆ÷¡£´Ë±í£¬SideWalkµÄLinuxºÍWindows±äÌåÔÚÔËÐз½Ê½¡¢¶à¸ö×é¼þµÄʵÏÖÒÔ¼°·Ö·¢payloadµÄ·½Ãæ´æÔÚ¾ªÈ˵ÄÀàËÆÖ®´¦£¬Ô̺¬Ò»ÑùµÄ¶¨ÔìChaCha20¡¢Èí¼þ¼Ü¹¹¡¢ÅäÖúÍdead-drop½âÎöÆ÷ʵÏÖ¡£


https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/


3¡¢±©Ñ©Ôâ·êDDoS¹¥»÷£¬Ê¹Ãüºô»½ºÍħÊÞÊÀ½çµÈ·þÎñÆ÷å´»ú

      

ýÌå9ÔÂ14Èճƣ¬±©Ñ©Ôâµ½DDoS¹¥»÷£¬¡¶Ê¹Ãüºô»½¡·PCºÍ¡¶Ä§ÊÞÊÀ½ç¡·µÅ×ÎÏ·µÄ·þÎñÆ÷å´»ú¡£¸Ã¹«Ë¾ÓÚ14ÈÕÉýƽÑ󹦷òÁ賿00:45³õ´ÎÈÏ¿ÉÁË·þÎñÆ÷³öÏÖÎÊÌ⣬ÆäʱËü˵ÔÚµ÷²éÒ»¸öÓ°ÏìÆäÈÏÖ¤·þÎñÆ÷µÄÎÊÌ⣬¸ÃÎÊÌâ¿ÉÄܵ¼ÖµÇ¼ʧ°Ü»ò»ºÂý¡£45·ÖÖÓºó£¬Ëü°ä²¼¸üÐÂÈ·ÈÏÖжÏÊÇÓÉÓÚÔâµ½ÁËDDoS¹¥»÷£¬¹¥»÷ÕßÔÚÊÔͼ·ÛËéÆäÍøÂ磬ËûÃǽ«³ÖÐø»ý¼«¼à¿ØÔÚ½øÐеÄDDoS¹¥»÷¡£×îÐÂÐÂÎųÆ£¬½ØÖÁÓ¢¹ú¹¦·òÖÐÎç12:18£¬Õë¶Ô±©Ñ©·þÎñÆ÷µÄDDoS¹¥»÷ÒѾ­ÊµÏÖ¡£


https://www.videogameschronicle.com/news/call-of-duty-pc-world-of-warcraft-servers-down-as-blizzard-suffers-ddos-attack/


4¡¢UNC4034ͨ¹ýľÂí»¯PuTTY SSH¿Í»§¶ËÀ´¹¥»÷´«Ã½ÐÐÒµ 

      

9ÔÂ14ÈÕ£¬Mandiant³ÆÔÚ7Ô·ݷ¢ÏÖÁËUNC4034Õë¶Ô´«Ã½ÐÐÒµµÄÐÂÐÍÓã²æÊ½´¹µö»î¶¯¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýWhatsAppÓëÖ¸±ê³ÉÁ¢Í¨Ñ¶£¬²¢ÒýÓÕËûÃÇÏÂÔØ¶ñÒâISOÈí¼þ°ü£¬¸ÃÈí¼þ°üÒÔÐéαµÄ¹¤×÷»úÓöΪµö¶ü£¬×îÖÕ»áͨ¹ýľÂí»¯PuTTY×°ÖúóÃÅAIRDRY.V2¡£ÓÉÓÚPuTTY¿ÉÖ´ÐÐÎļþÊǴӺϷ¨·¨Ê½±àÒë¶øÀ´µÄ£¬Òò¶øÖ°ÄÜÆëÈ«ÇÒ¿´ÆðÀ´ÓëºÏ·¨°æ±¾ÆëȫһÑù¡£¹¥»÷ÕßÅú¸ÄÁËPuTTYµÄconnect_to_host()º¯Êý£¬ÒÔ±ãÔڳɹ¦ÏνÓSSHºó£¬¸Ã·¨Ê½ÒÔDLL£¨"colorui.dll"£©µÄ´ó¾Ö×°ÖÃÒ»¸ö¶ñÒâµÄDAVESHELL shellcode payload¡£


https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing  


5¡¢Check Point Research°ä²¼8Ô·ÝÈ«ÇòÍþвָÊý»ã±¨

      

Check Point ResearchÔÚ9ÔÂ14ÈÕ°ä²¼ÁË8Ô·ÝÈ«ÇòÍþвָÊý»ã±¨¡£»ã±¨Ö¸³ö£¬FormBookÊÇ8Ô·Ý×î³£¼ûµÄ¶ñÒâÈí¼þ£¬È¡´úÁË×Ô1ÔÂÒÔÀ´Ò»Ïòά³ÖÕâһְλµÄEmotet£¬Æä´ÎÊÇAgentTesla¡¢XMRig¡¢GuloaderºÍEmotet¡£±¾Ô½ÌÓýºÍ×êÑÐÁìÓòÊÇÈ«ÇòÊܵ½¹¥»÷×î¶àµÄÐÐÒµ£¬Æä´ÎÊǵ±¾Ö/¾üʺÍISP/MSPÐÐÒµ¡£×î³£±»ÀûÓõķì϶ÊÇLog4jÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2021-44228£©£¬Ó°ÏìÁËÈ«Çò44%µÄ×éÖ¯¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þÊÇAlienBot£¬Æä´ÎÊÇAnubisºÍJoker¡£


https://blog.checkpoint.com/2022/09/14/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index/


6¡¢Unit 42°ä²¼¹ØÓÚ¶ñÒâÈí¼þOriginLoggerµÄ·ÖÎö»ã±¨

      

9ÔÂ13ÈÕ£¬Unit 42¾ßÌå½éÉÜÁËÃûΪOriginLoggerµÄ¶ñÒâÈí¼þµÄ¼¼Êõϸ½Ú£¬Ëü±»´µÅ£ÎªAgent TeslaµÄ¼ÌÈÎÕß¡£¸Ã¶ñÒâÈí¼þͨ¹ýÒ»¸öµö¶üWordÎĵµ·Ö·¢£¬Ö¸±ê´ò¿ª¸ÃÎĵµÊ±»áÏÔʾµÂ¹ú¹«ÃñµÄ»¤ÕÕºÍÐÅÓþ¿¨µÄͼÏñ£¬ÒÔ¼°Ç¶ÈëÆäÖеÄһЩExcel¹¤×÷±í¡£¹¤×÷±íÔ̺¬Ò»¸öVBAºê£¬Ê¹ÓÃMSHTAŲÓÃÍйÜÔÚÔ¶³Ì·þÎñÆ÷ÉϵÄHTMLÒ³Ãæ£¬ÆäÖÐÔ̺¬Ò»¸ö»ìºÏµÄJavaScript´úÂ룬ÓÃÓÚ»ñÈ¡ÍйÜÔÚBitbucketÉϵÄÁ½¸ö±àÂë¶þ½øÔìÎļþ£¬¶øºóÀûÓùý³Ì¿ÕÐļ¼Êõ½«OrionLogger payload×¢Èëµ½aspnet_compiler.exe¹ý³ÌÖС£


https://unit42.paloaltonetworks.com/originlogger/