ContiÏàÖúͬ°éÒòÐÄ»³²»Âú¹ûÕæ¸ÃÍÅ»ïC2µØµãµÈÐÅÏ¢£»£»£»ESETÅû¶14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å

Ðû²¼Ê±¼ä 2021-08-06

1.Òâ´óÀûÄÜÔ´¹«Ë¾ERGÔâµ½ÀÕË÷Èí¼þLockBit 2.0¹¥»÷


1.jpg


Òâ´óÀûÄÜÔ´¹«Ë¾ERG³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£ERGÊÇÒâ´óÀûÁìÏȵķçµçÔËÓªÉÌ£¬ £¬£¬£¬Ò²ÊÇÅ·ÖÞÊг¡Ê®´ó½ÉÏÔËÓªÉÌÖ®Ò»¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬ £¬£¬£¬ÓÉÓÚ·¢Ã÷¹¥»÷ºóѸËÙ×°ÖÃÁËÄÚ²¿Çå¾²³ÌÐò£¬ £¬£¬£¬Òò´ËÆäÐÅÏ¢ºÍͨѶÊÖÒÕ(ICT)»ù´¡ÉèÊ©¡°Ö»±¬·¢ÁËÒ»ÔÙÉÔ΢µÄÖÐÖ¹¡°£¬ £¬£¬£¬ÇÒÏÖÔÚÕýÔÚ»º½âÕâЩÖÐÖ¹¡£¡£¡£¡£La Repubblica±¨µÀ³Æ£¬ £¬£¬£¬´Ë´Î¹¥»÷ÊÇÓÉÀÕË÷ÍÅ»ïLockBit 2.0×éÖ¯µÄ¡£¡£¡£¡£ÔÚ²»¾Ãǰ£¬ £¬£¬£¬Òâ´óÀûÀ­Æë°Â´óÇøÒ²Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬µ¼Ö¸õØÇøµÄITϵͳ̱»¾¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/energy-group-erg-reports-minor-disruptions-after-ransomware-attack/    


2.ESETÅû¶14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å


2.jpg


ESETÑо¿Ö°Ô±ÔÚBlack Hat USAÇå¾²¾Û»áÉÏÐû²¼ÁË14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×壬 £¬£¬£¬ÆäÖÐÓÐ10¸öÊÇмͼµÄ¡£¡£¡£¡£¸ÃÑо¿×ܹ²ÍøÂçÁË80¶à¸ö¶ñÒâÈí¼þÑù±¾£¬ £¬£¬£¬²¢½«ËüÃÇ·ÖΪÁË14¸ö¼Ò×壬 £¬£¬£¬ÆäÖд󲿷ÖÊÇÔÚ2018ÄêÖÁ2021Äêʱ´úÊ״μì²âµ½µÄ£¬ £¬£¬£¬²¢ÇÒÏÖÔÚÈÔÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬ÕâЩ¶ñÒâÈí¼þ¶¼ÊÇЧÀÍÆ÷¶Ë¶ñÒâÈí¼þ£¬ £¬£¬£¬ËüÃÇÖ÷ÒªÓÐÁ½¸ö¹¦Ð§£ºÉó²é²¢×èµ²ÓëЧÀÍÆ÷µÄËùÓÐͨѶ£¬ £¬£¬£¬ÒÔ¼°Ó°ÏìÇëÇóµÄ´¦Öóͷ£·½·¨¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/several-malware-families-targeting-iis.html


3.Ñо¿Ö°Ô±Åû¶Cobalt StrikeÖоܾøÐ§ÀÍÎó²îµÄϸ½Ú


3.jpg


SentinelLabsÑо¿Ö°Ô±Åû¶ÁËCobalt StrikeÖоܾøÐ§ÀÍÎó²îµÄϸ½Ú¡£¡£¡£¡£Cobalt StrikeÊÇÕýµ±µÄÉøÍ¸²âÊÔ¹¤¾ß£¬ £¬£¬£¬Ö÷Òª×÷Ϊºì¶ÓµÄ¹¥»÷¿ò¼Ü£¬ £¬£¬£¬Í¬Ê±Ò²±»ºÚ¿ÍÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-36798£¨²¢³ÆÎªHotcobalt£©£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔÚÄ¿µÄЧÀÍÆ÷ÉÏ×¢²á¼Ùbeacon£¬ £¬£¬£¬È»ºóÏòЧÀÍÆ÷·¢ËÍÐéαʹÃüÀ´ºÄ¾¡¿ÉÓÃÄÚ´æ¶øÊ¹Ð§ÀÍÆ÷Í߽⣬ £¬£¬£¬½ø¶øµ¼ÖÂÄ¿µÄÎÞ·¨ÓëC2ͨѶ£¬ £¬£¬£¬×ÌÈźì¶Ó£¨»òºÚ¿Í£©µÄ²Ù×÷¡£¡£¡£¡£HelpSystems¹«Ë¾ÔÚCobalt Strike 4.4ÖÐÐÞ¸´ÁËÎó²î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-cobalt-strike-bugs-allow-takedown-of-attackers-servers/


4.¹È¸èÐû²¼Çå¾²¸üУ¬ £¬£¬£¬ÐÞ¸´Chromeä¯ÀÀÆ÷ÖÐ10¸öÎó²î


4.jpg


¹È¸èÐû²¼Çå¾²¸üУ¬ £¬£¬£¬ÐÞ¸´ÁËChromeä¯ÀÀÆ÷ÖеÄ10¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪɳÏäÌÓÒÝÎó²î£¨CVE-2021-30590£©£¬ £¬£¬£¬¿ÉÔÚChromeµÄɳÏäÖ®ÍâʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬ÉÐÓÐTab GroupsÖеÄÔ½½çдÈëÎó²î£¨CVE-2021-30592£©ºÍTab StripsÖеÄÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2021-30593£©£¬ £¬£¬£¬ÈôÊǹ¥»÷ÕßÄÜÔÚÔ½½ç¶ÁÈ¡±¬·¢Ö®Ç°Êʵ±µÄÉèÖÃÄڴ棬 £¬£¬£¬¾ÍÓпÉÄÜʹÓÃÕâÁ½¸öÎó²îÈÆ¹ýɳÏä¡£¡£¡£¡£´Ë´Î»¹ÐÞ¸´ÁËCVE-2021-30591ºÍCVE-2021-30594µÈÎó²î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-several-chrome-flaws-can-be-exploited-malicious-extensions


5.ContiÏàÖúͬ°éÒòÐÄ»³²»Âú¹ûÕæ¸ÃÍÅ»ïC2µØµãµÈÐÅÏ¢


5.jpg


ContiµÄÏàÖúͬ°éÒò¶ÔÀûÒæ·ÖÅɲ»¹«¶øÐÄ»³²»Âú£¬ £¬£¬£¬¹ûÕæÁ˸ÃÍÅ»ïµÄC2µØµãµÈÉñÃØÐÅÏ¢¡£¡£¡£¡£Conti×÷ΪRaaS£¬ £¬£¬£¬Æä½¹µãÍŶÓÖÎÀí¶ñÒâÈí¼þºÍTorÕ¾µã£¬ £¬£¬£¬È»ºóÕÐļÏàÖúͬ°éÖ´ÐÐÍøÂçÎó²îºÍ¼ÓÃÜ×°±¸¡£¡£¡£¡£Í¨³£½¹µãÍŶÓ׬ȡÊê½ðµÄ20-30%£¬ £¬£¬£¬¶øÆäËüÈË׬ȡʣÓಿ·Ö¡£¡£¡£¡£´Ë´Î¹ûÕæÁËCobalt Strike C2ЧÀÍÆ÷µÄIPµØµãºÍÒ»¸ö113 MBµÄµµ°¸£¬ £¬£¬£¬ÆäÖаüÀ¨ºÚ¿Í¹¤¾ß¡¢¶íÎÄÊֲᡢÅàѵÖÊÁϺÍ×ÊÖúÎĵµ¡£¡£¡£¡£¹ûÕæÕ߳ƣ¬ £¬£¬£¬ËûÃÇÖ®ÒÔÊÇÐû²¼ÕâЩÖÊÁÏ£¬ £¬£¬£¬ÊÇÓÉÓÚËûÔÚ¹¥»÷ÖÐÖ»»ñµÃÁË1500ÃÀÔªµÄ³ê½ð£¬ £¬£¬£¬¶øÆäËû³ÉÔ±Ôò׬ȡÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÿСÎÒ˽¼Ò¶¼×èÖ¹ÕâЩIPµØµã£¬ £¬£¬£¬ÒÔ±ÜÃâÀ´×Ô¸Ã×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/


6.Group IBÐû²¼TaskMasters¹¥»÷¶íÂÞ˹µÄÆÊÎö±¨¸æ


6.jpg


Group IBÐû²¼ÁËÓйØTaskMasters¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÖ÷ÒªÐÎòÁËÔÚ2020ÄêÕë¶Ô¶íÂÞ˹Áª°îÐÐÕþÕþ¸®µÄ¹¥»÷Öмì²âµ½µÄWebdav-O¶ñÒâÈí¼þ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶Ôx86ºÍx64ϵͳµÄÁ½¸ö°æ±¾µÄwebdev-o£¬ £¬£¬£¬ÆäÖÐx64°æ±¾±»ÓÃÓÚ¹¥»÷¶íÂÞ˹£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó2018Äê×îÏȾͱ£´æÁË¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬ÓÉÓÚWebdav-OÖÐÓÐÒ»×éÏÂÁîÀàËÆÓÚBlueTraveller£¨ÓÖÃû RemShell£©£¬ £¬£¬£¬Òò´ËÑо¿Ö°Ô±È·¶¨´Ë´Î¹¥»÷»î¶¯ÓëºÚ¿Í×éÖ¯TaskMastersÓйØÁª¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.group-ib.com/task