DarkCrewFriendsʹÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂ磻£» £»£»¶ñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP

Ðû²¼Ê±¼ä 2020-06-28

1.DarkCrewFriends»Ø¹é£¬£¬£¬£¬Ê¹ÓÃÄÚÈÝÖÎÀíϵͳ¹¹½¨½©Ê¬ÍøÂç


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Check PointµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ºÚ¿Í×éÖ¯DarkCrewFriends»Ø¹é£¬£¬£¬£¬²¢Ãé×¼ÄÚÈÝÖÎÀíϵͳÀ´¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯ÕýÔÚʹÓÃÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«Îó²îÀ´ÆÆËðÍøÕ¾µÄPHPЧÀÍÆ÷£¬£¬£¬£¬²¢ÔÚÊܺ¦ÕßЧÀÍÆ÷ÉÏ·¢Ã÷ÁËÏÂÔØºÍÖ´ÐÐÁ½¸ö.AFFÎļþµÄÏÂÁ£¬£¬£¬µ±ËûÃÇÏÂÔØÕâÁ½¸öÎļþʱ£¬£¬£¬£¬·¢Ã÷ËüÃÇÏÖʵÉÏÊÇPHPºÍPerlÎļþ¡£¡£¡£¡£ ¡£¡£¡£ÆÊÎöÖ°Ô±×ܽáµÀ£¬£¬£¬£¬¹¥»÷ÕßʹÓÃIRCЭÒéѬȾЧÀÍÆ÷À´½¨Éè½©Ê¬ÍøÂ磬£¬£¬£¬Õâ»á¶ÔÊܺ¦ÕߵĻù´¡ÉèÊ©±¬·¢ºÜÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/darkcrewfriends-returns-botnet/156963/


2.Evil Corp¹¥»÷30¶à¼ÒÃÀ¹ú¹«Ë¾²¢·Ö·¢WastedLocker


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÈüÃÅÌú¿ËÐû²¼±¨¸æ£¬£¬£¬£¬ÌåÏÖºÚ¿Í×éÖ¯Evil Corp¹¥»÷ÁË30¶à¼ÒÃÀ¹ú¹«Ë¾£¬£¬£¬£¬²¢ÊÔͼÔÚÊܺ¦ÕßϵͳÖÐ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£ ¡£¡£¡£ÔÚÕâЩ±»Ãé×¼µÄ¹«Ë¾ÖУ¬£¬£¬£¬³ýÁËÒ»¼ÒÊÇÍâÑó¿ç¹ú¹«Ë¾ÔÚÃÀ¹úµÄ×Ó¹«Ë¾£¬£¬£¬£¬ÆäÓàËùÓÐÊÇÃÀ¹ú¹«Ë¾£¬£¬£¬£¬Éæ¼°µ½ÁËÖÆÔìÒµ£¨5¼Ò£©£¬£¬£¬£¬ÐÅÏ¢ÊÖÒÕ²¿·Ö£¨4¼Ò£©ºÍµçÐÅ×éÖ¯£¨3¼Ò£©¡£¡£¡£¡£ ¡£¡£¡£ÈüÃÅÌú¿ËÆÊÎöµÀ£¬£¬£¬£¬¹¥»÷ʼÓÚ»ùÓÚJavaScriptµÄ¶ñÒâ¿ò¼ÜSocGholish£¬£¬£¬£¬¸Ã¿ò¼Ü¿É¸ú×Ù150¶à¸öαװ³ÉÈí¼þ¸üеÄÊÜÑ¬È¾ÍøÕ¾¡£¡£¡£¡£ ¡£¡£¡£Ò»µ©¹¥»÷Õß»ñµÃÁËÄ¿µÄÍøÕ¾µÄ»á¼ûȨ£¬£¬£¬£¬¾Í»áʹÓÃCobalt StrikeÀ´ÇÔȡƾ֤¡¢ÌáȨ²¢ºáÏòÒÆ¶¯£¬£¬£¬£¬Ö¼ÔÚ×°ÖÃWastedLocker¡£¡£¡£¡£ ¡£¡£¡£ÈüÃÅÌú¿Ë±¨¸æµÄĩβ»¹ÌṩÁËÓйØWastedLocker¹¥»÷µÄΣº¦Ö¸±ê£¨IOC£©¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/evil-corp-blocked-from-deploying-ransomware-on-30-major-us-firms/


3.еĶñÒâ.slkÎļþ¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATP


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AvananµÄÇå¾²ÆÊÎöʦÒѼì²âµ½¿ÉÈÆ¹ýMicrosoft 365 EOPºÍATPµÄеĶñÒâ.slkÎļþ£¬£¬£¬£¬Ô¤¼Æ»á¸ø2ÒÚ¶àÓû§´øÀ´Î£º¦¡£¡£¡£¡£ ¡£¡£¡£Ôڴ˹¥»÷ÖУ¬£¬£¬£¬ºÚ¿Í·¢ËÍ´øÓÐ.slk¸½¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬¸Ã¸½¼þ»¹°üÀ¨ÓÃÀ´ÏÂÔØºÍ×°ÖÃÔ¶³Ì»á¼ûľÂíµÄ¶ñÒâºê£¨MSI exec¾ç±¾£©¡£¡£¡£¡£ ¡£¡£¡£¸Ã.slkÎļþ¿ÉÒÔÒþ²ØµÄÔËÐÐWindows×°ÖóÌÐò(msiexec)£¬£¬£¬£¬ÒÔ×°ÖÃËûÃÇÔÚÆäÕ¾µãÉÏÍйܵÄMSI°ü¡£¡£¡£¡£ ¡£¡£¡£ÔÚÕâ´Î¹¥»÷»î¶¯ÖУ¬£¬£¬£¬ºÚ¿ÍʹÓõÄÊÇÔ¶³Ì¿ØÖÆÓ¦ÓóÌÐòNetSupportµÄºÚ¿Í°æ±¾£¬£¬£¬£¬ËüÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆ×ÀÃæ¡£¡£¡£¡£ ¡£¡£¡£ºÚ¿Í»¹Ê¹ÓÃÁËÐí¶àÓÃÀ´ÈƹýATPµÄ»ìÏýÊÖÒÕ£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬ÓʼþÊÇ´ÓÊý°Ù¸öÃâ·ÑµÄhotmailÕÊ»§·¢Ë͵Ä£»£» £»£»ºê¾ç±¾°üÀ¨¡°^¡±×Ö·û£¬£¬£¬£¬ÒÔ»ìÏýATP¹ýÂËÆ÷£»£» £»£»¸ÃÍøÖ·±»·Ö³ÉÁ½²¿·Ö£¬£¬£¬£¬Òò´ËATP²»»á½«ÆäÊÓÎªÍøÂçÁ´½Ó£¬£¬£¬£¬µÈµÈ¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.informationsecuritybuzz.com/news/200m-users-at-risk-new-malicious-slk-files-are-bypassing-microsoft-365-security/


4.½ü300¸öWindows 10¿ÉÖ´ÐÐÎļþÒ×Ôâµ½DLLÐ®ÖÆ¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÆÕ»ªÓÀµÀÇå¾²Ñо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ £¬£¬£¬£¬¿ìÒª300¸öWindows 10¿ÉÖ´ÐÐÎļþÈÝÒ×Êܵ½DLLÐ®ÖÆ¹¥»÷£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÒ»¸ö¼òÆÓµÄVBScriptÒ²Ðí¾Í¿ÉÒÔ»ñµÃÖÎÀíԱȨÏÞ²¢ÍêÈ«ÈÆ¹ýWindows 10ÉϵÄUAC¡£¡£¡£¡£ ¡£¡£¡£ÓÉÓÚWindows 7ÒÔÉÏÔÊÐíÊÜÐÅÈεÄϵͳDLL¿ÉÒÔ×Ô¶¯ÌáÉýÌØÈ¨£¬£¬£¬£¬¶ø²»±ØÊ¹ÓÃUACÌáÐÑÀ´´ò½ÁÓû§£¬£¬£¬£¬Òò´ËºÚ¿Í¿ÉÒÔͨ¹ýʹÓñê¼ÇΪ×Ô¶¯ÌáȨµÄ¿ÉÖ´ÐÐÎļþÀ´ÊµÑéÒÔ¸ü¸ßȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ ¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬Ôò¶ñÒâdll¿ÉÓÃÓÚ½¨ÉèÌáȨµÄÏÂÁîÌáÐÑ·û£¬£¬£¬£¬´Ó¶øÒÔÖÎÀíȨÏÞ¶ÔÅÌËã»ú¾ÙÐлá¼û¡£¡£¡£¡£ ¡£¡£¡£  


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/almost-300-windows-10-executables-vulnerable-to-dll-hijacking/


5.¶í¾ÍÒµÍøÕ¾SuperJobµÄϵͳ±£´æÎó²î£¬£¬£¬£¬Ð¹Â¶500Íò¹«ÃñÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


DeviceLock·¢Ã÷Á˶íÂÞ˹¾ÍÒµÍøÕ¾SuperJobÒòÆäϵͳ±£´æÎó²î£¬£¬£¬£¬Ð¹Â¶ÁË500Íò¹«ÃñÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¡£´Ë´Îй¶Êý¾Ý°üÀ¨Óû§ÐÕÃûºÍÖÐÐÄÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢¶¼»á¡¢ÆÚÍûµÄнˮˮƽ¡¢Òƶ¯ÔËÓªÉ̵ÄÃû³Æ¡¢Óû§µÄµØÇøºÍÊ±Çø¡£¡£¡£¡£ ¡£¡£¡£×¨¼ÒÆÊÎö£¬£¬£¬£¬´Ë´Î×ß©¿ÉÄÜÊÇÓÉÓÚÊý¾Ý¿âЧÀÍÆ÷ÖеÄÎó²îÒýÆðµÄ£¬£¬£¬£¬¿ÉÊÇSuperJob¾Ü¾øÌṩÓйش˴ÎÊÂÎñµÄÏêϸÐÅÏ¢ÒÔ¼°Æä500ÍòÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶µÄÉùÃ÷¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/06/experts-have-discovered-data-leak-of.html


6.ýÌ幫˾E27Ôâµ½Korean Hackers¹¥»÷£¬£¬£¬£¬Ô´´úÂëºÍÊý¾Ý¿âй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÑÇÖÞµÄýÌ幫˾E27Ôâµ½×Ô³ÆÎªKorean HackersµÄºÚ¿Í¹¥»÷µ¼ÖÂÔ´´úÂëºÍÊý¾Ý¿âй¶£¬£¬£¬£¬²¢±»ÒªÇóÖ§¸¶Ò»±Ê¡°Ð¡Ð¡µÄ¾èÇ®¡±£¬£¬£¬£¬ÒÔÏàʶÆäÊÇÔõÑù±»ºÚ¿ÍÈëÇÖ²¢×ÊÖúÆäÐÞ¸´Îó²î¡£¡£¡£¡£ ¡£¡£¡£¸ÃºÚ¿Í×éÖ¯Éù³ÆËûÃÇÇÔÈ¡ÁËÊܺ¦¹«Ë¾µÄÔ´´úÂëºÍÊý¾Ý¿â£¬£¬£¬£¬ÆäÖаüÀ¨µç×ÓÓʼþ¡¢ÊÖ»ú¡¢ÃÜÂë¡¢ÆäËûÎĵµ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼÏñµÈ¡£¡£¡£¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬E27ÒѾ­ÏòÆäÓû§·¢³öÁËÐÅϢй¶֪ͨ£¬£¬£¬£¬ÆäCEO Mohan BelaniÔòÌåÏÖ£¬£¬£¬£¬ËûÃÇÒÑÓëÖ´·¨²¿·ÖÈ¡µÃÁªÏµ£¬£¬£¬£¬²¢½«ÆÚ´ýËûÃǵÄÖ§³ÖºÍÖ¸µ¼¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-e27-want-donation-to-reveal-vulnerabilities/