Guacamaya¹«¿ªÖÇÀûµÈ¶à¸ö¹ú¶ÈµÄ¾üÊ»ú¹¹Ô¼10 GBÊý¾Ý

°ä²¼¹¦·ò 2022-09-21

1¡¢Guacamaya¹«¿ªÖÇÀûµÈ¶à¸ö¹ú¶ÈµÄ¾üÊ»ú¹¹Ô¼10 GBÊý¾Ý

      

¾Ý9ÔÂ19ÈÕ±¨Â·£¬×Ô³ÆGuacamayaµÄºÚ¿ÍÍÅ»ï°ä²¼ÁËÀ´×ÔÖÇÀûºÍÄ«Î÷¸çµÈ¶à¸ö¹ú¶ÈµÄ¾üʺ;¯Ô±»ú¹¹Ô¼10 GBµÄµç×ÓÓʼþµÈ×ÊÁÏ¡£¸ÃÍÅ»ïÖØÒªÕë¶ÔÖÐÃÀÖÞµØÓòµÄ×éÖ¯£¬ÕâÊÇÆä×Ô2022Äê3ÔÂÒÔÀ´µÚËĴι«¿ªÊý¾Ý£¬ÕâЩÊý¾Ý¶¼±»°ä²¼µ½ÁËEnlace Hacktivista¡£¾ÝϤ£¬Õâ´ÎÊÂÎñÖØÒªÉæ¼°ÁËÖÇÀûÎä×°¶ÓÁÐÕÕ·÷³¤ÁªÏ¯»áÒ顢īÎ÷¸ç¹ú·À²¿¡¢Èø¶ûÍß¶à¹ú¶ÈÃñ¾¯ºÍÈø¶ûÍß¶àÎä×°¶ÓÁÓ×¢¸çÂ×±ÈÑÇÎä×°¶ÓÁÐ×Ü˾Á¡¢ÃØÂ³Îä×°¶ÓÁнáºÏ˾ÁºÍÃØÂ³¾ü¶Ó¡£


https://www.cyberscoop.com/central-american-hacking-group-releases-emails/


2¡¢Imperva³ÆÒÑ×èÖ¹·¢Ëͳ¬¹ý253ÒÚ´ÎÒªÇóµÄDDoS¹¥»÷

      

9ÔÂ19ÈÕ£¬°²È«¹«Ë¾Imperva°ä·¢Òѳɹ¦ÕмÜÏòÆä¿Í»§·¢ËÍÁ˳¬¹ý253ÒÚ´ÎÒªÇóµÄDDoS¹¥»÷¡£¹¥»÷µÄÖ¸±êÊÇÒ»¼ÒµçÕÛ·þÎñÌṩÉÌ£¬ÓÚ2022Äê6ÔÂ27ÈÕÆðÍ·£¬·åֵΪÿÃë390Íò´ÎÒªÇó(RPS)£¬¾ùÔÈΪ180Íò´ÎRPS¡£·åÖµ³¬¹ý100ÍòRPSµÄ¹¥»÷ͨ³£Ö»³ÖÐø¼¸Ãëµ½¼¸·ÖÖÓ£¬µ«Õâ´Î¹¥»÷³ÖÐøÁËËĸö¶àÓ×ʱ¡£Õâ´Î¹¥»÷ÊÇÓɱ鲼180¸ö¹ú¶ÈºÍµØÓòµÄ½©Ê¬ÍøÂçÌáÒéµÄ£¬ÆäÖдóÎÞÊýIPµØÖ·Î»ÓÚÃÀ¹ú¡¢°ÍÎ÷ºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£½©Ê¬ÍøÂçʹÓÃÁË170000¸ö±»Ï°È¾É豸£¬Ô̺¬µ÷Ôì½âµ÷Æ÷ºÍÖÇÄÜÉãÏñÓŵÈ¡£


https://www.imperva.com/blog/record-25-3-billion-request-multiplexing-attack-mitigated-by-imperva/


3¡¢VMwareºÍ΢ÈíÌáÐÑChromeloader½üÆÚµÄ¶ñÒâ¹¥»÷»î¶¯

      

¾ÝýÌå9ÔÂ20ÈÕ±¨Â·£¬VMwareºÍMicrosoft·¢ÏÖChromeloader½üÆÚµÄ¹¥»÷»î¶¯»á´«²¼¶à¸ö¶ñÒâÈí¼þ¼Ò×塣΢ÈíÔÚÉÏÖÜÎåÅû¶ÁËһ·µã»÷ڲƭ»î¶¯£¬ÀûÓÃChromeloader·Ö·¢¸÷Àà¶ñÒâÈí¼þ£¬¹éÒòÓÚDEV-0796ÍŻVMware°ä²¼Ò»·Ý»ã±¨£¬ÏêÊöÁË×Ô8ÔÂÒÔÀ´·¢ÏֵĶà¸öChromeloader±äÌåµÄ¼¼Êõϸ½Ú¡£¸Ã¶ñÒâÈí¼þÖØÒªÒÔISOÎļþµÄ´ó¾Ö·Ö·¢¶ñÒâä¯ÀÀÆ÷À©´ó¡¢node-WebKit¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÈ¡£


https://securityaffairs.co/wordpress/135949/malware/chromeloader-malware-campaigns.html


4¡¢SandwormÍÅ»ï¼Ù×°³ÉµçÐÅÌṩÉ̹¥»÷ÎÚ¿ËÀ¼µÄ×éÖ¯

     

Recorded FutureÔÚ9ÔÂ19ÈÕÅû¶Á˺ڿÍÍÅ»ïSandworm¼Ù×°³ÉµçÐÅÌṩÉ̹¥»÷ÎÚ¿ËÀ¼×éÖ¯µÄ»î¶¯¡£Sandworm±»ÃÀ¹úµ±¾Ö¹éΪ¶íÂÞ˹GRU±í¹ú¾üʵý±¨²¿ÃŵÄÒ»²¿ÃÅ£¬ÔÚ½ñÄêÌáÒéÁËÂŴι¥»÷£¬Ô̺¬¶ÔÎÚ¿ËÀ¼ÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷¡£´Ó½ñÄê8ÔÂÆðÍ·£¬×êÑÐÈËÔ±·¢ÏÖʹÓüÙ×°³ÉÎÚ¿ËÀ¼µçÕÛ·þÎñÌṩÉ̵Ķ¯Ì¬DNSÓòµÄSandworm C2»ù´¡ÉèÊ©ÓÐËùÔö³¤£¬×î½üµÄ»î¶¯Ö¼ÔÚ½«Colibri LoaderºÍWarzone RATµÈÉÌÆ·¶ñÒâÈí¼þ×°Öõ½Ö¸±êµÄϵͳÉÏ¡£


https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunication-providers-in-ukraine


5¡¢½ðÈڿƼ¼¹«Ë¾Revolut 5Íò¶à¿Í»§µÄÓ×ÎÒÐÅϢй¶

      

ýÌå9ÔÂ19ÈÕ³ÆRevolutÔâµ½¹¥»÷£¬Î´¾­ÊÚȨµÄµÚÈý·½½Ó¼ûÁË5Íò¶à¸ö¿Í»§µÄÐÅÏ¢¡£Revolut³ÉÁ¢ÓÚ2015Ä꣬ÊÇÒ»¼Ò½ðÈڿƼ¼¹«Ë¾£¬Ä¿Ç°ÎªÈ«Çò¿Í»§Ìá¹©ÒøÐÓ×¢×ʽðÖÎÀíºÍͶ×Ê·þÎñ¡£¹¥»÷²úÉúÔÚÒ»ÖÜǰ£¬Æ¾¾Ý³õ´ëÊ©²éÁ˾Ö£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¼Êõ½Ó¼ûÁËRevolutµÄÊý¾Ý¿â£¬Ó°ÏìÁ˸ù«Ë¾0.16%µÄ¿Í»§¡£Õâ´ÎÊÂÎñй¶Á˿ͻ§µÄÐÕÃû¡¢µØÖ·¡¢Óʼþ¡¢µç»°ºÅÂë¡¢²¿ÃÅÖ§¸¶¿¨Êý¾ÝºÍÕË»§Êý¾ÝµÈ¡£


https://www.bleepingcomputer.com/news/security/revolut-hack-exposes-data-of-50-000-users-fuels-new-phishing-wave/


6¡¢Kaspersky°ä²¼¹ØÓÚÑÇÌ«µØÓòÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨

      

9ÔÂ19ÈÕ£¬Kaspersky°ä²¼¹ØÓÚÑÇÌ«µØÓòÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£¸Ã»ã±¨³Áµã·ÖÎöÁËÓ°ÏìÑÇÌ«µØÓò15¸ö¹ú¶ÈºÍµØÓòµÄ4700¶à¸ö×éÖ¯µÄ±í²¿ÍþвºÍÍøÂç·¸×ï»î¶¯µÄÊý¾Ý¡£»ã±¨Ö¸³ö£¬³¬¹ý¼«¶ÈÖ®Ò»µÄ·ì϶ÊÇProxyLogon£¬ÔÚÈÕ±¾43%δ´ò²¹¶¡µÄ·þÎñÖж¼·¢ÏÖÁËÕâ¸ö·ì϶£»16003¸öÔ¶³Ì½Ó¼ûºÍÖÎÀí·þÎñ¿É¹©¹¥»÷ÕßʹÓ㬵±¾Ö»ú¹¹ÊÜÓ°Ïì×î´ó£»ÔÚ°µÍø£¬ºÚ¿Í¸üϲ»¶²É°ìºÍÏúÊÛÀ´×Ô°Ä´óÀûÑÇ¡¢Öйú¡¢Ó¡¶ÈºÍÈÕ±¾µÄ×éÖ¯µÄ½Ó¼ûȨÏÞ¡£


https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/09/16113048/Kaspersky-DFI_V7_opt.pdf