ContiÏàÖúͬ°éÒòÐÄ»³²»Âú¹ûÕæ¸ÃÍÅ»ïC2µØµãµÈÐÅÏ¢£»£»£»ESETÅû¶14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å
Ðû²¼Ê±¼ä 2021-08-061.Òâ´óÀûÄÜÔ´¹«Ë¾ERGÔâµ½ÀÕË÷Èí¼þLockBit 2.0¹¥»÷
Òâ´óÀûÄÜÔ´¹«Ë¾ERG³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£ERGÊÇÒâ´óÀûÁìÏȵķçµçÔËÓªÉÌ£¬£¬£¬£¬Ò²ÊÇÅ·ÖÞÊг¡Ê®´ó½ÉÏÔËÓªÉÌÖ®Ò»¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ÓÉÓÚ·¢Ã÷¹¥»÷ºóѸËÙ×°ÖÃÁËÄÚ²¿Çå¾²³ÌÐò£¬£¬£¬£¬Òò´ËÆäÐÅÏ¢ºÍͨѶÊÖÒÕ(ICT)»ù´¡ÉèÊ©¡°Ö»±¬·¢ÁËÒ»ÔÙÉÔ΢µÄÖÐÖ¹¡°£¬£¬£¬£¬ÇÒÏÖÔÚÕýÔÚ»º½âÕâЩÖÐÖ¹¡£¡£¡£¡£La Repubblica±¨µÀ³Æ£¬£¬£¬£¬´Ë´Î¹¥»÷ÊÇÓÉÀÕË÷ÍÅ»ïLockBit 2.0×éÖ¯µÄ¡£¡£¡£¡£ÔÚ²»¾Ãǰ£¬£¬£¬£¬Òâ´óÀûÀÆë°Â´óÇøÒ²Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼Ö¸õØÇøµÄITϵͳ̱»¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/energy-group-erg-reports-minor-disruptions-after-ransomware-attack/
2.ESETÅû¶14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å
ESETÑо¿Ö°Ô±ÔÚBlack Hat USAÇå¾²¾Û»áÉÏÐû²¼ÁË14¸öÃé×¼IIS WebЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬ÆäÖÐÓÐ10¸öÊÇмͼµÄ¡£¡£¡£¡£¸ÃÑо¿×ܹ²ÍøÂçÁË80¶à¸ö¶ñÒâÈí¼þÑù±¾£¬£¬£¬£¬²¢½«ËüÃÇ·ÖΪÁË14¸ö¼Ò×壬£¬£¬£¬ÆäÖд󲿷ÖÊÇÔÚ2018ÄêÖÁ2021Äêʱ´úÊ״μì²âµ½µÄ£¬£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þ¶¼ÊÇЧÀÍÆ÷¶Ë¶ñÒâÈí¼þ£¬£¬£¬£¬ËüÃÇÖ÷ÒªÓÐÁ½¸ö¹¦Ð§£ºÉó²é²¢×èµ²ÓëЧÀÍÆ÷µÄËùÓÐͨѶ£¬£¬£¬£¬ÒÔ¼°Ó°ÏìÇëÇóµÄ´¦Öóͷ£·½·¨¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/08/several-malware-families-targeting-iis.html
3.Ñо¿Ö°Ô±Åû¶Cobalt StrikeÖоܾøÐ§ÀÍÎó²îµÄϸ½Ú
SentinelLabsÑо¿Ö°Ô±Åû¶ÁËCobalt StrikeÖоܾøÐ§ÀÍÎó²îµÄϸ½Ú¡£¡£¡£¡£Cobalt StrikeÊÇÕýµ±µÄÉøÍ¸²âÊÔ¹¤¾ß£¬£¬£¬£¬Ö÷Òª×÷Ϊºì¶ÓµÄ¹¥»÷¿ò¼Ü£¬£¬£¬£¬Í¬Ê±Ò²±»ºÚ¿ÍÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-36798£¨²¢³ÆÎªHotcobalt£©£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔÚÄ¿µÄЧÀÍÆ÷ÉÏ×¢²á¼Ùbeacon£¬£¬£¬£¬È»ºóÏòЧÀÍÆ÷·¢ËÍÐéαʹÃüÀ´ºÄ¾¡¿ÉÓÃÄÚ´æ¶øÊ¹Ð§ÀÍÆ÷Í߽⣬£¬£¬£¬½ø¶øµ¼ÖÂÄ¿µÄÎÞ·¨ÓëC2ͨѶ£¬£¬£¬£¬×ÌÈźì¶Ó£¨»òºÚ¿Í£©µÄ²Ù×÷¡£¡£¡£¡£HelpSystems¹«Ë¾ÔÚCobalt Strike 4.4ÖÐÐÞ¸´ÁËÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-cobalt-strike-bugs-allow-takedown-of-attackers-servers/
4.¹È¸èÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Chromeä¯ÀÀÆ÷ÖÐ10¸öÎó²î
¹È¸èÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËChromeä¯ÀÀÆ÷ÖеÄ10¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪɳÏäÌÓÒÝÎó²î£¨CVE-2021-30590£©£¬£¬£¬£¬¿ÉÔÚChromeµÄɳÏäÖ®ÍâʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÉÐÓÐTab GroupsÖеÄÔ½½çдÈëÎó²î£¨CVE-2021-30592£©ºÍTab StripsÖеÄÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2021-30593£©£¬£¬£¬£¬ÈôÊǹ¥»÷ÕßÄÜÔÚÔ½½ç¶ÁÈ¡±¬·¢Ö®Ç°Êʵ±µÄÉèÖÃÄڴ棬£¬£¬£¬¾ÍÓпÉÄÜʹÓÃÕâÁ½¸öÎó²îÈÆ¹ýɳÏä¡£¡£¡£¡£´Ë´Î»¹ÐÞ¸´ÁËCVE-2021-30591ºÍCVE-2021-30594µÈÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/google-patches-several-chrome-flaws-can-be-exploited-malicious-extensions
5.ContiÏàÖúͬ°éÒòÐÄ»³²»Âú¹ûÕæ¸ÃÍÅ»ïC2µØµãµÈÐÅÏ¢
ContiµÄÏàÖúͬ°éÒò¶ÔÀûÒæ·ÖÅɲ»¹«¶øÐÄ»³²»Âú£¬£¬£¬£¬¹ûÕæÁ˸ÃÍÅ»ïµÄC2µØµãµÈÉñÃØÐÅÏ¢¡£¡£¡£¡£Conti×÷ΪRaaS£¬£¬£¬£¬Æä½¹µãÍŶÓÖÎÀí¶ñÒâÈí¼þºÍTorÕ¾µã£¬£¬£¬£¬È»ºóÕÐļÏàÖúͬ°éÖ´ÐÐÍøÂçÎó²îºÍ¼ÓÃÜ×°±¸¡£¡£¡£¡£Í¨³£½¹µãÍŶÓ׬ȡÊê½ðµÄ20-30%£¬£¬£¬£¬¶øÆäËüÈË׬ȡʣÓಿ·Ö¡£¡£¡£¡£´Ë´Î¹ûÕæÁËCobalt Strike C2ЧÀÍÆ÷µÄIPµØµãºÍÒ»¸ö113 MBµÄµµ°¸£¬£¬£¬£¬ÆäÖаüÀ¨ºÚ¿Í¹¤¾ß¡¢¶íÎÄÊֲᡢÅàѵÖÊÁϺÍ×ÊÖúÎĵµ¡£¡£¡£¡£¹ûÕæÕ߳ƣ¬£¬£¬£¬ËûÃÇÖ®ÒÔÊÇÐû²¼ÕâЩÖÊÁÏ£¬£¬£¬£¬ÊÇÓÉÓÚËûÔÚ¹¥»÷ÖÐÖ»»ñµÃÁË1500ÃÀÔªµÄ³ê½ð£¬£¬£¬£¬¶øÆäËû³ÉÔ±Ôò׬ȡÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÿСÎÒ˽¼Ò¶¼×èÖ¹ÕâЩIPµØµã£¬£¬£¬£¬ÒÔ±ÜÃâÀ´×Ô¸Ã×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/
6.Group IBÐû²¼TaskMasters¹¥»÷¶íÂÞ˹µÄÆÊÎö±¨¸æ
Group IBÐû²¼ÁËÓйØTaskMasters¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÖ÷ÒªÐÎòÁËÔÚ2020ÄêÕë¶Ô¶íÂÞ˹Áª°îÐÐÕþÕþ¸®µÄ¹¥»÷Öмì²âµ½µÄWebdav-O¶ñÒâÈí¼þ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶Ôx86ºÍx64ϵͳµÄÁ½¸ö°æ±¾µÄwebdev-o£¬£¬£¬£¬ÆäÖÐx64°æ±¾±»ÓÃÓÚ¹¥»÷¶íÂÞ˹£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó2018Äê×îÏȾͱ£´æÁË¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÓÉÓÚWebdav-OÖÐÓÐÒ»×éÏÂÁîÀàËÆÓÚBlueTraveller£¨ÓÖÃû RemShell£©£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±È·¶¨´Ë´Î¹¥»÷»î¶¯ÓëºÚ¿Í×éÖ¯TaskMastersÓйØÁª¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.group-ib.com/task