DarkCrewFriendsʹÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂ磻£»£»£»¶ñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP
Ðû²¼Ê±¼ä 2020-06-281.DarkCrewFriends»Ø¹é£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂç
Check PointµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯DarkCrewFriends»Ø¹é£¬£¬£¬£¬£¬£¬£¬²¢Ãé×¼ÄÚÈÝÖÎÀíϵͳÀ´¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯ÕýÔÚʹÓÃÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«Îó²îÀ´ÆÆËðÍøÕ¾µÄPHPЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊܺ¦ÕßЧÀÍÆ÷ÉÏ·¢Ã÷ÁËÏÂÔØºÍÖ´ÐÐÁ½¸ö.AFFÎļþµÄÏÂÁ£¬£¬£¬£¬£¬£¬µ±ËûÃÇÏÂÔØÕâÁ½¸öÎļþʱ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ËüÃÇÏÖʵÉÏÊÇPHPºÍPerlÎļþ¡£¡£¡£¡£¡£¡£ÆÊÎöÖ°Ô±×ܽáµÀ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃIRCÐÒéѬȾЧÀÍÆ÷À´½¨Éè½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬Õâ»á¶ÔÊܺ¦ÕߵĻù´¡ÉèÊ©±¬·¢ºÜÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/darkcrewfriends-returns-botnet/156963/
2.Evil Corp¹¥»÷30¶à¼ÒÃÀ¹ú¹«Ë¾²¢·Ö·¢WastedLocker
ÈüÃÅÌú¿ËÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖºÚ¿Í×éÖ¯Evil Corp¹¥»÷ÁË30¶à¼ÒÃÀ¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼÔÚÊܺ¦ÕßϵͳÖÐ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£¡£¡£ÔÚÕâЩ±»Ãé×¼µÄ¹«Ë¾ÖУ¬£¬£¬£¬£¬£¬£¬³ýÁËÒ»¼ÒÊÇÍâÑó¿ç¹ú¹«Ë¾ÔÚÃÀ¹úµÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÆäÓàËùÓÐÊÇÃÀ¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬£¬Éæ¼°µ½ÁËÖÆÔìÒµ£¨5¼Ò£©£¬£¬£¬£¬£¬£¬£¬ÐÅÏ¢ÊÖÒÕ²¿·Ö£¨4¼Ò£©ºÍµçÐÅ×éÖ¯£¨3¼Ò£©¡£¡£¡£¡£¡£¡£ÈüÃÅÌú¿ËÆÊÎöµÀ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ʼÓÚ»ùÓÚJavaScriptµÄ¶ñÒâ¿ò¼ÜSocGholish£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼Ü¿É¸ú×Ù150¶à¸öαװ³ÉÈí¼þ¸üеÄÊÜÑ¬È¾ÍøÕ¾¡£¡£¡£¡£¡£¡£Ò»µ©¹¥»÷Õß»ñµÃÁËÄ¿µÄÍøÕ¾µÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬¾Í»áʹÓÃCobalt StrikeÀ´ÇÔȡƾ֤¡¢ÌáȨ²¢ºáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×°ÖÃWastedLocker¡£¡£¡£¡£¡£¡£ÈüÃÅÌú¿Ë±¨¸æµÄĩβ»¹ÌṩÁËÓйØWastedLocker¹¥»÷µÄΣº¦Ö¸±ê£¨IOC£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/evil-corp-blocked-from-deploying-ransomware-on-30-major-us-firms/
3.еĶñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP
AvananµÄÇå¾²ÆÊÎöʦÒѼì²âµ½¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATPµÄеĶñÒâ.slkÎļþ£¬£¬£¬£¬£¬£¬£¬Ô¤¼Æ»á¸ø2ÒÚ¶àÓû§´øÀ´Î£º¦¡£¡£¡£¡£¡£¡£Ôڴ˹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í·¢ËÍ´øÓÐ.slk¸½¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬¸Ã¸½¼þ»¹°üÀ¨ÓÃÀ´ÏÂÔØºÍ×°ÖÃÔ¶³Ì»á¼ûľÂíµÄ¶ñÒâºê£¨MSI exec¾ç±¾£©¡£¡£¡£¡£¡£¡£¸Ã.slkÎļþ¿ÉÒÔÒþ²ØµÄÔËÐÐWindows×°ÖóÌÐò(msiexec)£¬£¬£¬£¬£¬£¬£¬ÒÔ×°ÖÃËûÃÇÔÚÆäÕ¾µãÉÏÍйܵÄMSI°ü¡£¡£¡£¡£¡£¡£ÔÚÕâ´Î¹¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓõÄÊÇÔ¶³Ì¿ØÖÆÓ¦ÓóÌÐòNetSupportµÄºÚ¿Í°æ±¾£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆ×ÀÃæ¡£¡£¡£¡£¡£¡£ºÚ¿Í»¹Ê¹ÓÃÁËÐí¶àÓÃÀ´ÈƹýATPµÄ»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬£¬ÓʼþÊÇ´ÓÊý°Ù¸öÃâ·ÑµÄhotmailÕÊ»§·¢Ë͵컣»£»£»ºê¾ç±¾°üÀ¨¡°^¡±×Ö·û£¬£¬£¬£¬£¬£¬£¬ÒÔ»ìÏýATP¹ýÂËÆ÷£»£»£»£»¸ÃÍøÖ·±»·Ö³ÉÁ½²¿·Ö£¬£¬£¬£¬£¬£¬£¬Òò´ËATP²»»á½«ÆäÊÓÎªÍøÂçÁ´½Ó£¬£¬£¬£¬£¬£¬£¬µÈµÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.informationsecuritybuzz.com/news/200m-users-at-risk-new-malicious-slk-files-are-bypassing-microsoft-365-security/
4.½ü300¸öWindows 10¿ÉÖ´ÐÐÎļþÒ×Ôâµ½DLLÐ®ÖÆ¹¥»÷
ÆÕ»ªÓÀµÀÇå¾²Ñо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ £¬£¬£¬£¬£¬£¬£¬¿ìÒª300¸öWindows 10¿ÉÖ´ÐÐÎļþÈÝÒ×Êܵ½DLLÐ®ÖÆ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÒ»¸ö¼òÆÓµÄVBScriptÒ²Ðí¾Í¿ÉÒÔ»ñµÃÖÎÀíԱȨÏÞ²¢ÍêÈ«ÈÆ¹ýWindows 10ÉϵÄUAC¡£¡£¡£¡£¡£¡£ÓÉÓÚWindows 7ÒÔÉÏÔÊÐíÊÜÐÅÈεÄϵͳDLL¿ÉÒÔ×Ô¶¯ÌáÉýÌØÈ¨£¬£¬£¬£¬£¬£¬£¬¶ø²»±ØÊ¹ÓÃUACÌáÐÑÀ´´ò½ÁÓû§£¬£¬£¬£¬£¬£¬£¬Òò´ËºÚ¿Í¿ÉÒÔͨ¹ýʹÓñê¼ÇΪ×Ô¶¯ÌáȨµÄ¿ÉÖ´ÐÐÎļþÀ´ÊµÑéÒÔ¸ü¸ßȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬£¬£¬£¬Ôò¶ñÒâdll¿ÉÓÃÓÚ½¨ÉèÌáȨµÄÏÂÁîÌáÐÑ·û£¬£¬£¬£¬£¬£¬£¬´Ó¶øÒÔÖÎÀíȨÏÞ¶ÔÅÌËã»ú¾ÙÐлá¼û¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/almost-300-windows-10-executables-vulnerable-to-dll-hijacking/
5.¶í¾ÍÒµÍøÕ¾SuperJobµÄϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶500Íò¹«ÃñÐÅÏ¢
DeviceLock·¢Ã÷Á˶íÂÞ˹¾ÍÒµÍøÕ¾SuperJobÒòÆäϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁË500Íò¹«ÃñÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´Îй¶Êý¾Ý°üÀ¨Óû§ÐÕÃûºÍÖÐÐÄÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢¶¼»á¡¢ÆÚÍûµÄнˮˮƽ¡¢Òƶ¯ÔËÓªÉ̵ÄÃû³Æ¡¢Óû§µÄµØÇøºÍÊ±Çø¡£¡£¡£¡£¡£¡£×¨¼ÒÆÊÎö£¬£¬£¬£¬£¬£¬£¬´Ë´Î×ß©¿ÉÄÜÊÇÓÉÓÚÊý¾Ý¿âЧÀÍÆ÷ÖеÄÎó²îÒýÆðµÄ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇSuperJob¾Ü¾øÌṩÓйش˴ÎÊÂÎñµÄÏêϸÐÅÏ¢ÒÔ¼°Æä500ÍòÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶µÄÉùÃ÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/06/experts-have-discovered-data-leak-of.html
6.ýÌ幫˾E27Ôâµ½Korean Hackers¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô´´úÂëºÍÊý¾Ý¿âй¶
ÑÇÖÞµÄýÌ幫˾E27Ôâµ½×Ô³ÆÎªKorean HackersµÄºÚ¿Í¹¥»÷µ¼ÖÂÔ´´úÂëºÍÊý¾Ý¿âй¶£¬£¬£¬£¬£¬£¬£¬²¢±»ÒªÇóÖ§¸¶Ò»±Ê¡°Ð¡Ð¡µÄ¾èÇ®¡±£¬£¬£¬£¬£¬£¬£¬ÒÔÏàʶÆäÊÇÔõÑù±»ºÚ¿ÍÈëÇÖ²¢×ÊÖúÆäÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯Éù³ÆËûÃÇÇÔÈ¡ÁËÊܺ¦¹«Ë¾µÄÔ´´úÂëºÍÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨µç×ÓÓʼþ¡¢ÊÖ»ú¡¢ÃÜÂë¡¢ÆäËûÎĵµ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼÏñµÈ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬E27ÒѾÏòÆäÓû§·¢³öÁËÐÅϢй¶֪ͨ£¬£¬£¬£¬£¬£¬£¬ÆäCEO Mohan BelaniÔòÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒÑÓëÖ´·¨²¿·ÖÈ¡µÃÁªÏµ£¬£¬£¬£¬£¬£¬£¬²¢½«ÆÚ´ýËûÃǵÄÖ§³ÖºÍÖ¸µ¼¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-e27-want-donation-to-reveal-vulnerabilities/