΢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö¹Øë¶ÔÃÀ¹ú»ù´¡ÉèÊ©
°ä²¼¹¦·ò 2023-05-261¡¢Î¢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö¹Øë¶ÔÃÀ¹ú»ù´¡ÉèÊ©
5ÔÂ24ÈÕ£¬Î¢Èí³ÆÖÁÉÙ´Ó 2021 ÄêÄêÖÐÆðÍ·£¬Volt Typhoon¾ÍÒ»Ö¹Øë¶ÔÃÀ¹ú¹ØµººÍÆäËü¸÷µØµÄ¹Ø¼ü»ù´¡ÉèÊ©¡£±»ÈëÇÖ×é֝ɿ¼°µ±¾Ö¡¢º£Ê¡¢Í¨Ñ¶¡¢Ôì×÷¡¢ÐÅÏ¢¼¼Êõ¡¢¹«ÓÃÊÂÒµ¡¢½»Í¨¡¢¹¹ÖþºÍ½ÌÓýÐÐÒµ¡£¹¥»÷ÕßÊ×ÏÈÀûÓÃδ֪µÄÁãÈÕ·ì϶ÈëÇÖFortinet FortiGuardÉ豸£¬À´ÊµÏÖ¶ÔÖ¸±êµÄ³õʼ½Ó¼û¡£¶øºóÀûÓÃPowerShell¡¢Certutil¡¢NetshºÍWMICµÈLOLBinsÖ´ÐÐliving-off-the-land¹¥»÷¡£ÎåÑÛͬÃ˳ƣ¬¸ÃÍŻﻹÀûÓÃÁË¿ªÔ´¹¤¾ß£¬Èçfrp¡¢MimikatzºÍImpacketµÈ¡£
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
2¡¢SuperVPNÒòÊý¾Ý¿âÅäÖÃÃýÎóй¶3.6ÒÚÌõÓû§¼Í¼
¾Ý5ÔÂ24ÈÕ±¨Â·£¬Ãâ·ÑVPN·þÎñSuperVPNÒòÊý¾Ý¿âÅäÖÃÃýÎó£¬Ð¹Â¶ÁË360308817ÌõÓû§¼Í¼£¬×ܼÆ133 GBÊý¾Ý¡£ÕâЩ¼Í¼³ýÁËÔ̺¬Óû§ÓʼþµØÖ·¡¢ÔʼIPµØÖ·¡¢µØÀíµØÎ»Êý¾ÝºÍ·þÎñÆ÷ʹÓüͼµÈÃô¸ÐÐÅÏ¢£¬»¹Ô̺¬ÃÜÔ¿¡¢Î¨Ò»ÀûÓ÷¨Ê½Óû§IDºÅºÍUUIDºÅµÈ¡£¹ÌÈ»SuperVPNÐû³ÆËü²»´æ´¢Óû§ÈÕÖ¾£¬µ«Ð¹Â¶µÄÊý¾ÝÅú×¢ÕæÊµÇé¿ö²¢·ÇÈç´Ë£¬ÕâÓë¸Ã¹«Ë¾µÄÕþ²ßÏàì¶Ü¡£´Ë±í£¬ÔÚÊý¾Ý¿âÖл¹·¢ÏÖStorm VPN¡¢Luna VPN¡¢Radar VPN¡¢Rocket VPNºÍGhost VPNµÈVPNÌṩÉÌÃû³Æ£¬Äܹ»´§¶ÈËüÃÇÔÚijÖÖˮƽÉÏÊÇÓйصġ£
https://www.hackread.com/free-vpn-service-supervpn-leaks-user-records/
3¡¢Akamai·¢ÏÖ½©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ
AkamaiÔÚ5ÔÂ25ÈÕ³ÆÆä·¢ÏÖÁËÐÂÐͽ©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê5ÔÂÆðÍ·»îÔ¾£¬Õë¶ÔÓÎÏ·¹«Ë¾¡¢ÓÎÏ··þÎñÆ÷Íйܹ©¸øÉÌ¡¢ÔÚÏßÁ÷ýÌåºÍÆäËûÓÎÏ·ÉçÇø³ÉÔ±¡£Í¨¹ý¶ÈÎö×êÑÐÈËԱȷ¶¨ËüµÄ¹¥»÷DZÁ¦Ô¼ÔÚ629.28 Gbps¡£¸Ã½©Ê¬ÍøÂçÒÔGafgyt¡¢QBot¡¢MiraiºÍÆäËü¶ñÒâÈí¼þΪÀ¶±¾£¬½ØÖÁ2Ô·ݣ¬ËüÔ̺¬414̨ÔËÐи÷ÀàÖ¸Á¼Ü¹¹µÄÉ豸£¬ÈçARMv4¡¢x86¡¢MIPSEL¡¢MIPSºÍARM7¡£¸Ã°¸ÀýµÄÌØÊâÖ®´¦ÔÚÓÚ£¬¹¥»÷Õß°ä²¼ÁËËûÃǹ¥»÷µÄʵʱ¼Í¼£¬¹©ËùÓÐÈ˲鿴¡£
https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile
4¡¢Check Point¹«¿ªAgriusÍÅ»ïÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯
5ÔÂ24ÈÕ£¬Check Point¹«¿ªÁËÒÁÀʺڿÍÍÅ»ïAgriusÕë¶ÔÒÔÉ«ÁÐ×éÖ¯µÄ¹¥»÷»î¶¯¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÀûÓ÷þÎñÆ÷Öеķì϶»ñµÃÖ¸±êµÄ³õʼ½Ó¼ûȨÏÞ¡£¶øºóÀûÓÃÒÔÉ«ÁеÄProtonVPN½Úµã·Ö·¢°µ²ØÔÚ¡°Certificate¡±Îı¾ÎļþÖеÄASPXSpy webshell±äÌå¡£Ö®ºó£¬Agrius´Óufile.ioºÍeasyupload.ioµÈºÏ·¨ÎļþÍÐ¹ÜÆ½Ì¨»ñÈ¡ÀÕË÷Èí¼þMoneybirdµÄ¿ÉÖ´ÐÐÎļþ¡£ÔÚĿǰ·¢ÏֵݸÀýÖУ¬¸ÃÀÕË÷Èí¼þ½öÕë¶ÔF:\User Shares¡£ÕâÅú×¢MoneybirdµÄÖ¸±ê×óÌ»ÓÚµ¼ÖÂÒµÎñÖжϣ¬¶ø²»ÊÇËø¶¨ÍÆËã»ú¡£
https://research.checkpoint.com/2023/agrius-deploys-moneybird-in-targeted-attacks-against-israeli-organizations/
5¡¢Barracuda³ÆÆäESGÖзì϶CVE-2023-2868Òѱ»ÀûÓÃ
¾ÝýÌå5ÔÂ24ÈÕ±¨Â·£¬Barracuda³Æ·¢ÏÔìäESGÉ豸ÖÐÔ¶³ÌºÅÁî×¢Èë·ì϶£¨CVE-2023-2868£©Òѱ»ÀûÓ᣸÷ì϶λÓÚµç×ÓÓʼþ¸½¼þɸѡģ¿éÖУ¬Ô´ÓÚÓû§ÌṩµÄ.tarÎļþµÄÊäÈëÑéÖ¤²»ÆëÈ«¡£·ì϶ÓÚ5ÔÂ19ÈÕ±»·¢ÏÖ£¬²¢ÓÚ5ÔÂ20ÈÕºÍ21ÈÕ°ä²¼µÄÁ½¸ö°²È«²¹¶¡Öб»½¨¸´¡£Barracudaй©£¬Æä²¿Ãſͻ§µÄESGÉ豸Ôâµ½¹¥»÷£¬¹¥»÷ÕßÀûÓø÷ì϶¶Ôµç×ÓÓʼþÍø¹ØÉ豸×Ó¼¯µÄ½øÐÐδÊÚȨµÄ½Ó¼û¡£Barracuda°µÊ¾£¬µ÷²é½öÏÞÓÚÆäESG²úÆ·£¬½¨ÒéÊܵ½Ó°ÏìµÄ×éÖ¯ÔÙ²é³Ò»ÏÂËûÃǵÄÍøÂ磬ÒÔÈ·¶¨ÆäËüϵͳÊÇ·ñ±»ÈëÇÖ¡£
https://securityaffairs.com/146620/hacking/barracuda-email-security-gateway-bug.html
6¡¢WP Cookie Consent²å¼þÖеÄXSS·ì϶Òѱ»´ó¹æÄ£ÀûÓÃ
5ÔÂ24ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±·¢ÏÖÁË´ó¹æÄ£ÀûÓÃWordPress Cookie Consent²å¼þBeautiful Cookie Consent BannerÖÐXSS·ì϶µÄ»î¶¯¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚÔËÐиòå¼þµÄWordPressÍøÕ¾ÉÏ´´½¨¶ñÒâÖÎÀíÔ¹ØÊ»§£¬·ì϶ÒÑÓÚ1Ô·ݱ»½¨¸´¡£Æ¾¾Ý¼Í¼£¬¸Ã·ì϶×Ô2ÔÂ5ÈÕÒÔÀ´Ò»Ïò±»»ý¼«ÀûÓá£×Ô5ÔÂ23ÈÕÒÔÀ´£¬×êÑÐÈËÔ±ÒѾ¼ì²âµ½À´×Ô½ü14000¸öIPµØÖ·µÄ½ü300Íò´ÎÕë¶Ô³¬¹ý150Íò¸öÍøÕ¾µÄ¹¥»÷£¬²¢ÇÒ£¬Ä¿Ç°¹¥»÷ÈÔÔÚ³ÖÐø¡£
https://www.bleepingcomputer.com/news/security/hackers-target-15m-wordpress-sites-with-cookie-consent-plugin-exploit/


¾©¹«Íø°²±¸11010802024551ºÅ