Sucuri·¢ÏÖ´ó¹æÄ£µÄSEO»î¶¯ÒÑÈëÇÖ½ü15000¸öÍøÕ¾
°ä²¼¹¦·ò 2022-11-11¾Ý11ÔÂ9ÈÕ±¨Â·£¬Sucuri·¢ÏÖһ·´ó¹æÄ£µÄËÑË÷ÒýÇæÓÅ»¯(SEO)»î¶¯£¬ÈëÇÖÁ˽ü15000¸öÍøÕ¾£¬½«½Ó¼ûÕß³Á¶¨Ïòµ½Î±ÔìµÄÎÊ´ð»áÉÌÂÛ̳¡£Ã¿¸ö±»¹¥»÷µÄÍøÕ¾¶¼Ô̺¬Ô¼Äª20000¸öÎļþ£¬×÷ΪËÑË÷ÒýÇæÀ¬»øÓʼþ»î¶¯µÄÒ»²¿ÃÅ£¬ÆäÖдóÎÞÊýÍøÕ¾ÊÇWordPress¡£¹¥»÷Õß»áÅú¸ÄWordPressµÄPHPÎļþ£¬Èç'wp-singup.php'ºÍ'wp-cron.php'£¬À´×¢Èë³Á¶¨Ïò¡£ÓÐʱ¹¥»÷Õß»áÔÚÖ¸±êÍøÕ¾ÉÏ·Ö·¢ËûÃÇ×Ô¼ºµÄPHPÎļþ£¬²¢Ê¹ÓÃÁËËæ»ú»òαºÏ·¨µÄÎļþÃû£¬Èç'wp-logln.php'¡£
https://www.bleepingcomputer.com/news/security/15-000-sites-hacked-for-massive-google-seo-poisoning-campaign/
2¡¢Mandian¼ì²âµ½APT29Õë¶ÔÅ·ÖÞ±í½»×éÖ¯µÄ¹¥»÷»î¶¯
MandianÔÚ11ÔÂ8Èճƣ¬APT29³É¹¦µØ´¹µö¹¥»÷ÁËÒ»¸öÅ·ÖÞµÄ±í½»ÊµÌ壬²¢×îÖÕÀûÓÃÁËWindowsƾ֤ÖÜÓΣ¨Credential Roaming£©Ö°ÄÜ¡£×êÑÐÈËÔ±ÔÚ2022ËêÊ×APT29ϰȾָ±êʱ£¬¹Û²ìµ½Õë¶ÔActive DirectoryϵͳִÐеĴóÁ¿ÓµÓзǵäÐÍÊôÐÔµÄLDAP²éÎÊ¡£½øÒ»²½²é³·¢ÏÖ£¬´ËÊôÐÔÊÇActive DirectoryÍ´´¦ÖÜÓÎÖ°ÄܵÄÒ»²¿ÃÅ¡£×êÑÐÈËÔ±»¹Ç¿µ÷ÁËÒ»¸öËÁÒâÎļþдÈëµ¼ÖµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-30170£©£¬¿É±»¹¥»÷Õß±øÆ÷»¯À´Ö´Ðй¥»÷¡£
https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming
3¡¢IceXLoaderÐû³ÆÒÑϰȾȫÇòÊýǧ̨Ó×ÎÒºÍ×éÖ¯µÄPC
11ÔÂ8ÈÕ±¨Â·³Æ£¬Ð°汾µÄIceXLoader¿ÉÄÜÒÑϰȾÁËÈ«ÇòÊýǧ̨É豸¡£IceXLoaderÓÚ½ñÄê6Ô³õ´Î±»Fortinet·¢ÏÖ£¬ÊÇÒ»ÖÖóÒ×¶ñÒâÈí¼þ¡£Æäʱ·¢Ïֵİ汾£¨v3.0£©ÈçͬÈÔÔÚ¿ª·¢ÖУ¬×êÑÐÈËÔ±½üÆÚ·¢ÏÖÁËÒ»¸öÖ°ÄÜÆëÈ«ÇÒÔ̺¬¶à½×¶Î·Ö·¢Á´µÄ°æ±¾£¨v3.3.3£©¡£Ï°È¾Ê¼ÓÚͨ¹ý´¹µöÓʼþ·¢Ë͵ÄZIPÎļþ£¬Ëü»á·Ö·¢ÏÂÒ»½×¶ÎµÄ¿ÉÖ´ÐÐÎļþSTOREM~2.exe£¬×îÖÕIceXLoader»áʹÓùý³Ì¿ÕÐÄ×¢Èëµ½STREM~2.exeÖС£×êÑÐÈËÔ±ÒÑÏòÊÜÓ°ÏìµÄ¹«Ë¾´«µÝÁËÕâ´ÎÊÂÎñ£¬µ«¸Ã¶ñÒâÈí¼þµÄ±»¹¥»÷Ö¸±êµÄÊý¾Ý¿âÈÔÔÚ²»ÐݸüС£
https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world/
4¡¢Å·ÖÞÐ̾¯×éÖ¯¿ÛÁôÉæÏӲμÓLockBitÀÕË÷¹¥»÷µÄÏÓÒÉÈË
Å·ÖÞÐ̾¯×éÖ¯11ÔÂ10ÈÕ°ä·¢¿ÛÁôÁËÒ»ÃûÓëLockBitÀÕË÷¹¥»÷ÓйصÄÏÓÒÉÈË¡£ÕâÃû33ËêµÄÏÓÒÉÈËÃû½ÐMikhail Vasiliev£¬Õ¼ÓжíÂÞ˹ºÍ¼ÓÄôóË«¹ú¼®£¬ÓÚ10ÔÂ26ÈÕÔÚ¼ÓÄô󰲴ÖÂÔÊ¡±»²¶¡£·¨ÂÉÈËÔ±´ÓÆä¼ÒÖвé»ñÁË8̨µçÄÔºÍ32¸ö±íÖÃÓ²ÅÌ¡¢Á½°ÑǹºÍ¼ÛÖµ40ÍòÅ·ÔªµÄ¼ÓÃÜÇ®±Ò¡£¹ÌȻŷÖÞÐ̾¯×éÖ¯½«ÆäÃèÊöΪLockBitµÄÔËÓªÈËÔ±£¬µ«ËûºÜ¿ÉÄÜÊÇ×÷Ϊ¸Ã»î¶¯µÄ´ÓÊô»ú¹¹¶ø·ÇÖÎÀíÕß¡£Ëû´Ë¿ÌÔÚÆÚ´ýÒòÉæÏӲμÓLockBitÀÕË÷¹¥»÷¶ø±»Òý¶Éµ½ÃÀ¹ú¡£
https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/
5¡¢Trend Micro°ä²¼¹ØÓÚEarth LongzhiÍÅ»ïµÄ·ÖÎö»ã±¨
Trend MicroÔÚ11ÔÂ9ÈÕ°ä²¼Á˹ØÓÚEarth LongzhiÍÅ»ïµÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ï´Ó2020Äê¾ÍÆðÍ·»îÔ¾£¬ÀûÓö¨Ôì°æ±¾µÄCobalt Strike¼ÓÔØ·¨Ê½ÔÚÖ¸±êÖÐÖ²ÈëºóÃÅ¡£Ëü»¹ÓëEarth BakuÓÐÀàËÆµÄTTP£¬Á½Õß¶¼±»ÒÔΪÊÇAPT41×Ó×éÖ¯¡£¸Ã×éÖ¯µÚÒ»´Î»î¶¯²úÉúÔÚ2020Äê5ÔÂÖÁ2021Äê2Ô£¬ÀûÓÃSymatic¹¥»÷Öйų́ÍåÈ·µ±¾Ö¡¢Ò½ÁƱ£½¡ºÍѧÊõµÈÐÐÒµ¡£µÚ¶þ´Î»î¶¯´Ó2021Äê8Ô³ÖÐøµ½2022Äê6Ô£¬ÀûÓÃCroxLoader¡¢BigpipeLoaderºÍOutLoaderµÈ¹¤¾ß£¬Õë¶ÔÌ©¹ú¡¢ÂíÀ´Î÷ÑǺÍÓ¡¶ÈÄáÎ÷Ñǵȹú¶ÈµÄ×éÖ¯¡£
https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html
6¡¢Check Point°ä²¼PyPIÉ϶ñÒâ°ü»ìºÏ·½Ê½µÄ·ÖÎö»ã±¨
11ÔÂ9ÈÕ£¬Check Pointй©Æä¼ì²âµ½Ò»¸öеĶñÒⷨʽ°ü£¬Ö¼ÔÚ°µ²ØÍ¼ÏñÖеĴúÂ벢ͨ¹ýGithubÉϵĿªÔ´ÏîĿϰȾPyPIÓû§¡£¸Ã¶ñÒâ°üÃûΪapicolor£¬¿´ËÆÊǸöͨ³£µÄ°ü£¬µ«Ëü»áÏÈÊÖ¶¯×°ÖÃÁ½¸ö°ürequestsºÍjudyb¡£judyb´úÂëÊÇÒ»¸öÒþдģ¿é£¬Õƹܰµ²ØºÍÏÔʾͼƬÖеݵ²ØÐÅÏ¢¡£Óû§ÔÚËÑË÷²¢×°ÖÃÕâЩ¿ªÔ´ÏîĿʱ£¬²¢²»ÖªÂ·ÆäÖаµ²Ø×ŶñÒâ´úÂ롣Ŀǰ£¬PyPIÔÚÊÕµ½Check PointµÄ»ã±¨ºóɾ³ýÁËapicolor°ü¡£
https://research.checkpoint.com/2022/check-point-cloudguard-spectral-exposes-new-obfuscation-techniques-for-malicious-packages-on-pypi/


¾©¹«Íø°²±¸11010802024551ºÅ