DarkCrewFriendsʹÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂ磻£» £»£»¶ñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP

Ðû²¼Ê±¼ä 2020-06-28

1.DarkCrewFriends»Ø¹é £¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂç


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Check PointµÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬ £¬£¬£¬£¬ºÚ¿Í×éÖ¯DarkCrewFriends»Ø¹é £¬£¬£¬ £¬£¬£¬£¬²¢Ãé×¼ÄÚÈÝÖÎÀíϵͳÀ´¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬ £¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯ÕýÔÚʹÓÃÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«Îó²îÀ´ÆÆËðÍøÕ¾µÄPHPЧÀÍÆ÷ £¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÊܺ¦ÕßЧÀÍÆ÷ÉÏ·¢Ã÷ÁËÏÂÔØºÍÖ´ÐÐÁ½¸ö.AFFÎļþµÄÏÂÁî £¬£¬£¬ £¬£¬£¬£¬µ±ËûÃÇÏÂÔØÕâÁ½¸öÎļþʱ £¬£¬£¬ £¬£¬£¬£¬·¢Ã÷ËüÃÇÏÖʵÉÏÊÇPHPºÍPerlÎļþ¡£¡£¡£¡£¡£ ¡£ÆÊÎöÖ°Ô±×ܽáµÀ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃIRCЭÒéѬȾЧÀÍÆ÷À´½¨Éè½©Ê¬ÍøÂç £¬£¬£¬ £¬£¬£¬£¬Õâ»á¶ÔÊܺ¦ÕߵĻù´¡ÉèÊ©±¬·¢ºÜÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/darkcrewfriends-returns-botnet/156963/


2.Evil Corp¹¥»÷30¶à¼ÒÃÀ¹ú¹«Ë¾²¢·Ö·¢WastedLocker


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÈüÃÅÌú¿ËÐû²¼±¨¸æ £¬£¬£¬ £¬£¬£¬£¬ÌåÏÖºÚ¿Í×éÖ¯Evil Corp¹¥»÷ÁË30¶à¼ÒÃÀ¹ú¹«Ë¾ £¬£¬£¬ £¬£¬£¬£¬²¢ÊÔͼÔÚÊܺ¦ÕßϵͳÖÐ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£¡£ ¡£ÔÚÕâЩ±»Ãé×¼µÄ¹«Ë¾ÖÐ £¬£¬£¬ £¬£¬£¬£¬³ýÁËÒ»¼ÒÊÇÍâÑó¿ç¹ú¹«Ë¾ÔÚÃÀ¹úµÄ×Ó¹«Ë¾ £¬£¬£¬ £¬£¬£¬£¬ÆäÓàËùÓÐÊÇÃÀ¹ú¹«Ë¾ £¬£¬£¬ £¬£¬£¬£¬Éæ¼°µ½ÁËÖÆÔìÒµ£¨5¼Ò£© £¬£¬£¬ £¬£¬£¬£¬ÐÅÏ¢ÊÖÒÕ²¿·Ö£¨4¼Ò£©ºÍµçÐÅ×éÖ¯£¨3¼Ò£©¡£¡£¡£¡£¡£ ¡£ÈüÃÅÌú¿ËÆÊÎöµÀ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷ʼÓÚ»ùÓÚJavaScriptµÄ¶ñÒâ¿ò¼ÜSocGholish £¬£¬£¬ £¬£¬£¬£¬¸Ã¿ò¼Ü¿É¸ú×Ù150¶à¸öαװ³ÉÈí¼þ¸üеÄÊÜÑ¬È¾ÍøÕ¾¡£¡£¡£¡£¡£ ¡£Ò»µ©¹¥»÷Õß»ñµÃÁËÄ¿µÄÍøÕ¾µÄ»á¼ûȨ £¬£¬£¬ £¬£¬£¬£¬¾Í»áʹÓÃCobalt StrikeÀ´ÇÔȡƾ֤¡¢ÌáȨ²¢ºáÏòÒÆ¶¯ £¬£¬£¬ £¬£¬£¬£¬Ö¼ÔÚ×°ÖÃWastedLocker¡£¡£¡£¡£¡£ ¡£ÈüÃÅÌú¿Ë±¨¸æµÄĩβ»¹ÌṩÁËÓйØWastedLocker¹¥»÷µÄΣº¦Ö¸±ê£¨IOC£©¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/evil-corp-blocked-from-deploying-ransomware-on-30-major-us-firms/


3.еĶñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AvananµÄÇå¾²ÆÊÎöʦÒѼì²âµ½¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATPµÄеĶñÒâ.slkÎļþ £¬£¬£¬ £¬£¬£¬£¬Ô¤¼Æ»á¸ø2ÒÚ¶àÓû§´øÀ´Î£º¦¡£¡£¡£¡£¡£ ¡£Ôڴ˹¥»÷ÖÐ £¬£¬£¬ £¬£¬£¬£¬ºÚ¿Í·¢ËÍ´øÓÐ.slk¸½¼þµÄµç×ÓÓʼþ £¬£¬£¬ £¬£¬£¬£¬¸Ã¸½¼þ»¹°üÀ¨ÓÃÀ´ÏÂÔØºÍ×°ÖÃÔ¶³Ì»á¼ûľÂíµÄ¶ñÒâºê£¨MSI exec¾ç±¾£©¡£¡£¡£¡£¡£ ¡£¸Ã.slkÎļþ¿ÉÒÔÒþ²ØµÄÔËÐÐWindows×°ÖóÌÐò(msiexec) £¬£¬£¬ £¬£¬£¬£¬ÒÔ×°ÖÃËûÃÇÔÚÆäÕ¾µãÉÏÍйܵÄMSI°ü¡£¡£¡£¡£¡£ ¡£ÔÚÕâ´Î¹¥»÷»î¶¯ÖÐ £¬£¬£¬ £¬£¬£¬£¬ºÚ¿ÍʹÓõÄÊÇÔ¶³Ì¿ØÖÆÓ¦ÓóÌÐòNetSupportµÄºÚ¿Í°æ±¾ £¬£¬£¬ £¬£¬£¬£¬ËüÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆ×ÀÃæ¡£¡£¡£¡£¡£ ¡£ºÚ¿Í»¹Ê¹ÓÃÁËÐí¶àÓÃÀ´ÈƹýATPµÄ»ìÏýÊÖÒÕ £¬£¬£¬ £¬£¬£¬£¬ÀýÈç £¬£¬£¬ £¬£¬£¬£¬ÓʼþÊÇ´ÓÊý°Ù¸öÃâ·ÑµÄhotmailÕÊ»§·¢Ë͵컣» £»£»ºê¾ç±¾°üÀ¨¡°^¡±×Ö·û £¬£¬£¬ £¬£¬£¬£¬ÒÔ»ìÏýATP¹ýÂËÆ÷£»£» £»£»¸ÃÍøÖ·±»·Ö³ÉÁ½²¿·Ö £¬£¬£¬ £¬£¬£¬£¬Òò´ËATP²»»á½«ÆäÊÓÎªÍøÂçÁ´½Ó £¬£¬£¬ £¬£¬£¬£¬µÈµÈ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.informationsecuritybuzz.com/news/200m-users-at-risk-new-malicious-slk-files-are-bypassing-microsoft-365-security/


4.½ü300¸öWindows 10¿ÉÖ´ÐÐÎļþÒ×Ôâµ½DLLÐ®ÖÆ¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÆÕ»ªÓÀµÀÇå¾²Ñо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ £¬£¬£¬ £¬£¬£¬£¬¿ìÒª300¸öWindows 10¿ÉÖ´ÐÐÎļþÈÝÒ×Êܵ½DLLÐ®ÖÆ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÒ»¸ö¼òÆÓµÄVBScriptÒ²Ðí¾Í¿ÉÒÔ»ñµÃÖÎÀíԱȨÏÞ²¢ÍêÈ«ÈÆ¹ýWindows 10ÉϵÄUAC¡£¡£¡£¡£¡£ ¡£ÓÉÓÚWindows 7ÒÔÉÏÔÊÐíÊÜÐÅÈεÄϵͳDLL¿ÉÒÔ×Ô¶¯ÌáÉýÌØÈ¨ £¬£¬£¬ £¬£¬£¬£¬¶ø²»±ØÊ¹ÓÃUACÌáÐÑÀ´´ò½ÁÓû§ £¬£¬£¬ £¬£¬£¬£¬Òò´ËºÚ¿Í¿ÉÒÔͨ¹ýʹÓñê¼ÇΪ×Ô¶¯ÌáȨµÄ¿ÉÖ´ÐÐÎļþÀ´ÊµÑéÒÔ¸ü¸ßȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£Ò»µ©ÀÖ³ÉʹÓà £¬£¬£¬ £¬£¬£¬£¬Ôò¶ñÒâdll¿ÉÓÃÓÚ½¨ÉèÌáȨµÄÏÂÁîÌáÐÑ·û £¬£¬£¬ £¬£¬£¬£¬´Ó¶øÒÔÖÎÀíȨÏÞ¶ÔÅÌËã»ú¾ÙÐлá¼û¡£¡£¡£¡£¡£ ¡£  


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/almost-300-windows-10-executables-vulnerable-to-dll-hijacking/


5.¶í¾ÍÒµÍøÕ¾SuperJobµÄϵͳ±£´æÎó²î £¬£¬£¬ £¬£¬£¬£¬Ð¹Â¶500Íò¹«ÃñÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


DeviceLock·¢Ã÷Á˶íÂÞ˹¾ÍÒµÍøÕ¾SuperJobÒòÆäϵͳ±£´æÎó²î £¬£¬£¬ £¬£¬£¬£¬Ð¹Â¶ÁË500Íò¹«ÃñÐÅÏ¢¡£¡£¡£¡£¡£ ¡£´Ë´Îй¶Êý¾Ý°üÀ¨Óû§ÐÕÃûºÍÖÐÐÄÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢¶¼»á¡¢ÆÚÍûµÄнˮˮƽ¡¢Òƶ¯ÔËÓªÉ̵ÄÃû³Æ¡¢Óû§µÄµØÇøºÍÊ±Çø¡£¡£¡£¡£¡£ ¡£×¨¼ÒÆÊÎö £¬£¬£¬ £¬£¬£¬£¬´Ë´Î×ß©¿ÉÄÜÊÇÓÉÓÚÊý¾Ý¿âЧÀÍÆ÷ÖеÄÎó²îÒýÆðµÄ £¬£¬£¬ £¬£¬£¬£¬¿ÉÊÇSuperJob¾Ü¾øÌṩÓйش˴ÎÊÂÎñµÄÏêϸÐÅÏ¢ÒÔ¼°Æä500ÍòÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶µÄÉùÃ÷¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/06/experts-have-discovered-data-leak-of.html


6.ýÌ幫˾E27Ôâµ½Korean Hackers¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬Ô´´úÂëºÍÊý¾Ý¿âй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÑÇÖÞµÄýÌ幫˾E27Ôâµ½×Ô³ÆÎªKorean HackersµÄºÚ¿Í¹¥»÷µ¼ÖÂÔ´´úÂëºÍÊý¾Ý¿âй¶ £¬£¬£¬ £¬£¬£¬£¬²¢±»ÒªÇóÖ§¸¶Ò»±Ê¡°Ð¡Ð¡µÄ¾èÇ®¡± £¬£¬£¬ £¬£¬£¬£¬ÒÔÏàʶÆäÊÇÔõÑù±»ºÚ¿ÍÈëÇÖ²¢×ÊÖúÆäÐÞ¸´Îó²î¡£¡£¡£¡£¡£ ¡£¸ÃºÚ¿Í×éÖ¯Éù³ÆËûÃÇÇÔÈ¡ÁËÊܺ¦¹«Ë¾µÄÔ´´úÂëºÍÊý¾Ý¿â £¬£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨µç×ÓÓʼþ¡¢ÊÖ»ú¡¢ÃÜÂë¡¢ÆäËûÎĵµ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼÏñµÈ¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ £¬£¬£¬ £¬£¬£¬£¬E27ÒѾ­ÏòÆäÓû§·¢³öÁËÐÅϢй¶֪ͨ £¬£¬£¬ £¬£¬£¬£¬ÆäCEO Mohan BelaniÔòÌåÏÖ £¬£¬£¬ £¬£¬£¬£¬ËûÃÇÒÑÓëÖ´·¨²¿·ÖÈ¡µÃÁªÏµ £¬£¬£¬ £¬£¬£¬£¬²¢½«ÆÚ´ýËûÃǵÄÖ§³ÖºÍÖ¸µ¼¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-e27-want-donation-to-reveal-vulnerabilities/