΢Èí°ä²¼10Ô·ÝÖܶþ²¹¶¡  £¬×ܼƽ¨¸´84¸ö°²È«·ì϶

°ä²¼¹¦·ò 2022-10-12
1¡¢Î¢Èí°ä²¼10Ô·ÝÖܶþ²¹¶¡  £¬×ܼƽ¨¸´84¸ö°²È«·ì϶

      

10ÔÂ11ÈÕ  £¬Î¢Èí°ä²¼ÁË2022Äê10Ô·ݵÄÖܶþ²¹¶¡  £¬×ܼƽ¨¸´ÁË84¸ö·ì϶£¨²»Ô̺¬10ÔÂ3ÈÕÔÚMicrosoft EdgeÖн¨¸´µÄ12¸ö·ì϶£©¡£Õâ´Î¹²½¨¸´ÁËÁ½¸ö¹«¿ªµÄ0 day  £¬±ðÀëΪWindows COM+ÊÂÎñϵͳ·þÎñÌáȨ·ì϶£¨CVE-2022-41033£©  £¬¿ÉÓÃÀ´»ñµÃϵͳȨÏÞ  £¬¸Ã·ì϶Òѱ»»ý¼«ÀûÓã»ÒÔ¼°Microsoft OfficeÐÅϢй¶·ì϶£¨CVE-2022-41043£©  £¬ÀûÓô˷ì϶¿É»ñµÃÓû§Éí·ÝÑéÖ¤ÁîÅÆµÄ½Ó¼ûȨÏÞ¡£µ«ÊÇ  £¬Õâ´Î¸üв»Ô̺¬Ô¤¼ÆÔÚ½ñÌ콨¸´µÄExchange ProxyNotShell·ì϶µÄ²¹¶¡  £¬Óû§Äܹ»ÀûÓÃ΢ÈíÌṩµÄ»º½â´ëÊ©¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2022-patch-tuesday-fixes-zero-day-used-in-attacks-84-flaws/


2¡¢ÃÀ¹ú¶à¸ö»ú³¡µÄÍøÕ¾ÔÚÔâµ½KillNetµÄDDoS¹¥»÷ºóÖжÏ

      

¾Ý10ÔÂ10ÈÕ±¨Â·  £¬ºÚ¿ÍÍÅ»ïKillNetÐû³Æ¶ÔÃÀ¹ú¶à¸öÖØÒª»ú³¡µÄÍøÕ¾½øÐÐÁË´ó¹æÄ£DDoS¹¥»÷  £¬Ê¹ÆäÎÞ·¨½Ó¼û¡£Ä¿Ç°  £¬ÍøÕ¾²»³ÉÓõĻú³¡Ô̺¬¹þ´Ä·Æ¶ûµÂ-½Ü¿ËÑ·ÑÇÌØÀ¼´ó¹ú¼Ê»ú³¡(ATL)ºÍÂåÉ¼í¶¹ú¼Ê»ú³¡(LAX)µÈ¡£ÆäËû·µ»ØÊý¾Ý¿âÏνÓÃýÎóµÄ»ú³¡Ô̺¬Ö¥¼Ó¸ç°ÂºÚ¶û¹ú¼Ê»ú³¡(ORD)¡¢°ÂÀ¼¶à¹ú¼Ê»ú³¡(MCO)ºÍµ¤·ð¹ú¼Ê»ú³¡(DIA)µÈ¡£KillNetÔÚÔÚÆäTelegramÉÏÁгöÁËÕâЩÓòÃû  £¬ËüµÄ³ÉÔ±ºÍ×ÔÔ¸Õß»áÔÚ´Ë´¦»ñÈ¡ÐÂÖ¸±ê¡£Õâ´Î¹¥»÷²»»áÓ°Ï캽°à  £¬µ«»á²úÉú²»ÀûÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/us-airports-sites-taken-down-in-ddos-attacks-by-pro-russian-hackers/


3¡¢Armorblox·¢ÏÖͨ¹ýZoomÇÔÈ¡ExchangeÍ´´¦µÄ´¹µö»î¶¯

      

ArmorbloxÔÚ10ÔÂ6ÈÕÅû¶ÁËÐÂÒ»ÂÖµÄZoom´¹µö»î¶¯¡£Õâ´Î»î¶¯ÖØÒªÕë¶ÔÒ½ÁƱ£½¡¹«Ë¾  £¬Äܹ»ÇáËÉÈÆ¹ýMicrosoft ExchangeÓʼþ°²È«»úÔì¡£´¹µöÓʼþ³ÆÔÚZoomÉÏÓÐÁ½ÌõÐÂÎÅ  £¬ÆäÖл¹Ô̺¬Á½¸ö¶ñÒâÁ´½Ó¡£Óû§ÔÚµã»÷ºó»á±»³Á¶¨Ïòµ½Ò»¸öαÔìµÄMicrosoftµÇÂ¼Ò³Ãæ  £¬²¢±»ÒªÇóÊäÈëMicrosoftÍ´´¦ÒÔ²éÔÄδ¶ÁZoomÐÂÎÅ¡£´Ë±í  £¬¹¥»÷ÕßÔÚÊÕ¼þÈ˲¿ÃÅʹÓÃÁËÓû§µÄÕæÊµÐÕÃûÀ´Ôö³¤¿ÉÐÅ¶È  £¬²¢ÀûÓÃÁËÒ»¸ö±»ÆÀΪ¡°ÖµµÃÐÅÈΡ±µÄÓÐЧÓòÃû¡£


https://www.armorblox.com/blog/zoom-credential-phishing-email-attack/


4¡¢MandiantÅû¶ÐµÄPhaaSƽ̨CaffeineµÄ¾ßÌåÐÅÏ¢

      

10ÔÂ10ÈÕ  £¬Mandiant¹«¿ªÁËÐÂÍøÂç´¹µö¼´·þÎñ(PhaaS)ƽ̨CaffeineµÄ¾ßÌåÐÅÏ¢¡£Óë´óÎÞÊýPhaaSƽ̨·ÖÆç  £¬CaffeineÓµÓÐÊ¢¿ªµÄ×¢²á¹ý³Ì  £¬²»±ØÒªÔ¼Çë»òÍÆ¼ö  £¬Ò²²»±ØÒª»ñµÃTelegram»òºÚ¿ÍÂÛ̳ÖÎÀíÔ±µÄºË×¼  £¬ÈκÎÈ˶¼Äܹ»²ÎÓë²¢ÆðÍ·´¹µö»î¶¯¡£CaffeineÌṩÁ˶àÖÖ´¹µöÄ£°åÑ¡Ïî  £¬Ô̺¬Microsoft 365ÒÔ¼°Õë¶ÔÖÐÎĺͶíÎÄÆ½Ì¨µÄ¸÷Ààµö¶ü  £¬ÈçÍøÒס£¸Ãƽ̨»¹ÔÊÐíÓû§Ê¹ÓÃ×Ô¼ºµÄÓʼþÖÎÀí·¨Ê½·¢ËÍ´¹µöÓʼþ  £¬´Ó¶øÏ÷¼õ¶Ô±í²¿¹¤¾ßµÄÐèÒª¡£


https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform


5¡¢Cymru°ä²¼¶ñÒâÈí¼þIcedID½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

CymruÔÚ10ÔÂ8ÈÕ³Æ  £¬IcedIDÔÚ½üÆÚµÄ¹¥»÷»î¶¯ÖÐʹÓÃÁË·ÖÆçµÄϰȾõè¾¶¡£»ã±¨Ö¸³ö  £¬ÔÚ9ÔÂ13ÈÕÖÁ21ÈÕ  £¬IcedIDµÄÖØÒª·Ö·¢·½Ê½Ô̺¬£ºZIP->ISO->LNK->JS->[CMD»òBAT]->DLL¡¢ZIP->ISO->CHM->DLL¡¢ZIP->ISO->LNK->BAT->DLL¡¢´øÓкêµÄ¶ñÒâWord»òExcelÎĵµÒÔ¼°Í¨¹ýPrivateLoader°´×°Öø¶·Ñ·þÎñÖ±½Ó·Ö·¢¡£ÕâЩ»î¶¯ÒªÃ´Ê¹ÓÃÒâ´óÀûÓï  £¬ÒªÃ´Ê¹ÓÃÓ¢Óï  £¬Ç°Õߵijɹ¦ÂʵÍÓÚºóÕß¡£ÆäÖÐ  £¬Ê¹ÓÃISO->LNKϰȾÁ´µÄ»î¶¯×î³É¹¦  £¬Æä´ÎÊÇʹÓÃÓÎÏ·ÆÆ½âµö¶üµÄPrivateLoader»î¶¯¡£


https://www.team-cymru.com/post/a-visualizza-into-recent-icedid-campaigns


6¡¢VMware°ä²¼¹ØÓÚEmotet¶ñÒâÈí¼þ¹©¸øÁ´µÄ·ÖÎö»ã±¨

      

10ÔÂ10ÈÕ  £¬VMware°ä²¼Á˹ØÓÚEmotet¶ñÒâÈí¼þ¹©¸øÁ´µÄ·ÖÎö»ã±¨¡£EmotetÔÚ2021ËêÊ×±»µ·»Ù  £¬VMwareÔÚ2022Äê1Ô³õ´Î·¢ÏÖ×îÐÂÒ»²¨Emotet¹¥»÷¡£×Ô´Ó³ÁгöÏÖÒÔÀ´  £¬EmotetÒѾ­·¢Õ¹³ÉΪȫÇò×îÏȽøµÄMaaS»ù´¡Éèʩ֮һ¡£¸Ã»ã±¨½ÒʾÁËÓйضñÒâÈí¼þÀûÓÃÁ´ºÍÄÚ²¿ÔË×÷µÄ¹Ø¼ü·¢ÏÖ£ºEmotetµÄ¹¥»÷ģʽÔÚ²»ÐÝÑݱ䡢ËüÄܹ»·þÎñÓÚ¶à¸ö¹¥»÷Ö¸±ê¡¢¿ª·¢Õß°µ²ØÁËËûÃǵÄC2»ù´¡ÉèÊ©ÒÔ¼°EmotetµÄ»ù´¡¼Ü¹¹ÔÚ²»Ðݱ䶯¡£


https://news.vmware.com/security/vmware-report-exposes-emotet-malware