¶íÂÞ˹FSBÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil²¢¾Ð²¶Æä14Ãû³ÉÔ±

Ðû²¼Ê±¼ä 2022-01-18

¶íÂÞ˹FSBÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil²¢¾Ð²¶Æä14Ãû³ÉÔ±


¶íÂÞ˹FSBÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil²¢¾Ð²¶Æä14Ãû³ÉÔ±.png


¾ÝýÌå1ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Áª°îÇå¾²¾ÖFSBÒÑÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil¡£¡£¡£¡£¡£¡£¡£REvilÊÇÈ¥Äê×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò»£¬£¬£¬£¬£¬£¬£¬Ôø¹¥»÷ÁËJBSºÍKaseya¡£¡£¡£¡£¡£¡£¡£¾Ý³ÆÕâÊÇÓ¦ÃÀ¹úÕþ¸®ÒªÇó¾ÙÐеÄͻϮÐж¯£¬£¬£¬£¬£¬£¬£¬Ö´·¨»ú¹¹ËѲéÁËĪ˹¿ÆºÍÊ¥±ËµÃ±¤µÈ¶¼»áµÄ25¸öËùÔÚ£¬£¬£¬£¬£¬£¬£¬²¢¾Ð²¶ÁË14ÃûÍÅ»ï³ÉÔ±£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ1È˼ÓÈëÁË2021Äê5ÔÂÕë¶ÔColonial PipelineµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâÔÙ´Î֤ʵÁËREvilÓëDarkSideÓйØÁª ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬FSB»¹²é»ñÁËÁè¼Ý4.26ÒÚ¬²¼£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚ·¸·¨»î¶¯µÄÅÌËã»ú¡¢¼ÓÃÜÇ®°üºÍ20Á¾Æû³µ¡£¡£¡£¡£¡£¡£¡£


https://threatpost.com/russian-security-revil-ransomware/177660/


ÎÚ¿ËÀ¼µÄ70¶à¸ö¹Ù·½ÍøÕ¾Í¬Ê±Ôâµ½´ó¹æÄ£¹¥»÷


1ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Õþ¸®ÔËÓªµÄÁè¼Ý70¸öÍøÕ¾ÀëÏßÊýСʱ¡£¡£¡£¡£¡£¡£¡£ÕâËÆºõÊÇÔ´ÓÚÒ»³¡´ó¹æÄ£µÄÐ­Í¬ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹úÖ´·¨²¿·ÖÌåÏÖ¿ÉÄÜÓë¶íÂÞ˹Óйء£¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼CERTÉù³ÆÕâЩ¹¥»÷¿ÉÄÜʹÓÃÁËLaravel-based October CMSÖеÄÎó²î(CVE-2021-32648)£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÎÚ¿ËÀ¼ÄÚ¸ó¡¢½ÌÓý¡¢Å©Òµ¡¢ÄÜÔ´¡¢ÍËÎéÎäÊ¿ÊÂÎñºÍÇéÐβ¿µÈ¶à¸ö²¿·ÖµÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯½öÔÚ±»ÈëÇÖÍøÕ¾µÄÖ÷Ò³ÉÏÐû²¼ÁËÑ°ÐÆÐÔÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÎÞСÎÒ˽¼ÒÊý¾Ýй¶µÄÇéÐΡ£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/01/massive-cyber-attack-knocks-down.html


È«Çò×î´óÐÅÓÿ¨ÉúÒâ°µÍøÊг¡UniCCÐû²¼½«×èÖ¹ÔËÓª


ýÌå1ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬È«Çò×î´óµÄÐÅÓÿ¨ºÍ½è¼Ç¿¨ÐÅÏ¢ÉúÒâ°µÍøÊг¡UniCCÐû²¼½«×èÖ¹ÔËÓª¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾ÓÚ2013ÄêÍÆ³ö£¬£¬£¬£¬£¬£¬£¬¾ÝÔ¤¼ÆÍ¨¹ý¸Ãƽ̨ÉúÒâµÄ¼ÓÃÜÇ®±ÒԼΪ3.58ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬1ÔÂ·ÝÆäÊг¡·Ý¶îµÖ´ïÁË30%¡£¡£¡£¡£¡£¡£¡£UniCCÖÎÀíÔ±ÔÚÐû²¼¹Ø±ÕÐÂÎÅºó¸ø»áÔ±Áô³öÁË10Ììʱ¼äÀ´ÏûºÄÓà¶î£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕâÊÇËûÃÇ×ö³öµÄ¾öÒ飬£¬£¬£¬£¬£¬£¬²»Òª¾ÙÐÐÒõıÂÛ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬½ü¼¸¸öÔÂÓжà¸ö°µÍøÊг¡¹Ø±Õ£¬£¬£¬£¬£¬£¬£¬°üÀ¨White House Market£¨10Ô£©¡¢Cannazon£¨11Ô£©¡¢Torrez£¨12Ô£©ºÍMonopoly Market£¨1Ô³õ£©¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126757/cyber-crime/unicc-shutting-down.html


ÀÕË÷Èí¼þQlocker»Ø¹é£¬£¬£¬£¬£¬£¬£¬ÔÙ´ÎÃé׼ȫÇòµÄQNAP NAS×°±¸


¾ÝýÌå1ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þQlocker»Ø¹é£¬£¬£¬£¬£¬£¬£¬²¢ÔÙ´ÎÃé׼ȫÇòµÄQNAPÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£¡£¡£¡£´ËǰQlockerÔøÔÚ4ÔÂ19ÈÕ×îÏÈ´ó¹æÄ£¹¥»÷QNAP¿Í»§£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ7-zip¼ÓÃÜÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÐµÄÀÕË÷»î¶¯Ê¼ÓÚ1ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬Ëü»áÔÚ±»ÈëÇÖ×°±¸ÉÏÁôÏÂÃûΪ!!!READ_ME.txtµÄÊê½ð¼Í¼£¬£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖÄ¿µÄ±»ÒªÇóÖ§¸¶0.02µ½0.03±ÈÌØ±Ò¡£¡£¡£¡£¡£¡£¡£Õâ²¢²»ÊÇΨһÕë¶ÔQNAP NASµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬×ÔÊ¥µ®½Ú×îÏÈ£¬£¬£¬£¬£¬£¬£¬ech0raixÕë¶ÔÆäµÄ¹¥»÷»î¶¯¼¤Ôö¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/qlocker-ransomware-returns-to-target-qnap-nas-devices-worldwide/


¹ú·À³Ð°üÉÌHensoldt³ÆÆäÓ¢¹ú×Ó¹«Ë¾ÒÑѬȾLorenz


¾Ý1ÔÂ14Èյı¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬µÂ¹ú¹ú·À³Ð°üÉÌHensoldtÈÏ¿ÉÆäÓ¢¹ú×Ó¹«Ë¾ÒÑѬȾÀÕË÷Èí¼þLorenz¡£¡£¡£¡£¡£¡£¡£Lorenz×Ô4ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬Êê½ðÒªÇóΪ500000µ½700000ÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¡£¡£2021Äê12ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬LorenzÉù³ÆÒѹ¥»÷Hensoldt£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÒÔÃÜÂë±£»£»£»£»£»¤ÎļþµÄÐÎʽÐû²¼ÁË95%µÄ±»µÁÎļþ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÓÐÓ¢¹ú×Ó¹«Ë¾µÄ²¿·ÖÒÆ¶¯×°±¸Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126738/malware/lorenz-ransomware-hit-hensoldt.html


eNomÊý¾ÝÖÐÐÄǨá㱬·¢¹ýʧµ¼ÖÂЧÀÍÔÝʱÖÐÖ¹


1ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÍйÜЧÀÍÉÌeNomµÄÊý¾ÝÖÐÐÄǨáã·ºÆð¹ýʧ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£²¿·ÖÓû§±¨¸æ³ÆÎÞ·¨ÔÙ¼û¼ûÍøÕ¾ºÍÓÊÏ䣬£¬£¬£¬£¬£¬£¬ÉÐÓÐÓû§ÌåÏÖÆäGmailÏÔʾÓÉÓÚeNomÕýÔÚ¾ÙÐÐÊý¾ÝÖÐÐÄǨá㣬£¬£¬£¬£¬£¬£¬DNSÎÞ·¨Õý³£ÊÂÇé¡£¡£¡£¡£¡£¡£¡£¾­ÓÉÊӲ죬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷ÓòÃûÆÊÎöÎÊÌâÓ°ÏìÁËÊý°Ù¸öÓòÃû£¬£¬£¬£¬£¬£¬£¬ÊÜÎÊÌâÓ°ÏìÓû§ÎÞ·¨¸ü¸ÄNameServers£¬£¬£¬£¬£¬£¬£¬ËûÃÇËùÄÜ×öµÄ¾ÍÊÇÆÚ´ýǨáãÍê³É¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/enom-data-center-migration-mistakenly-knocks-sites-offline/


Çå¾²¹¤¾ß


PasteMonitor


ץȡ Pastebin API ÒÔÍøÂçÖðÈÕÕ³Ìù£¬£¬£¬£¬£¬£¬£¬ÉèÖÃwordlist²¢ÔÚÆ¥Åäʱͨ¹ýµç×ÓÓʼþÎüÊÕ¾¯±¨¡£¡£¡£¡£¡£¡£¡£


https://github.com/pixelbubble/PasteMonitor


ipsourcebypass


´Ë Python ¾ç±¾¿ÉÓÃÓÚÈÆ¹ýʹÓà HTTP ±êÍ·µÄ IP Ô´ÏÞÖÆ¡£¡£¡£¡£¡£¡£¡£


https://github.com/p0dalirius/ipsourcebypass


elfloader


elfloader ÊÇÒ»¸ö³¬µÈ¼òÆÓµÄ ELF Îļþ¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬£¬ËüÌìÉúELFÔÚÄÚ´æÖÐµÄÆ½ÃæÌåÏÖ¡£¡£¡£¡£¡£¡£¡£


https://github.com/gamozolabs/elfloader


Çå¾²ÆÊÎö


ÓÉÓÚÆúÓÃSGX£¬£¬£¬£¬£¬£¬£¬ÐµÄÓ¢ÌØ¶ûоƬ½«ÎÞ·¨²¥·ÅÀ¶¹â¹âÅÌ


µÚ12´úÓ¢ÌØ¶û¿áî£11000ºÍ12000´¦Öóͷ£Æ÷×÷·ÏÁ˶ÔSGX£¨Èí¼þ±£»£»£»£»£»¤À©Õ¹£©µÄÖ§³Ö£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂPCÎÞ·¨²¥·Å4KÇø·ÖÂʵÄÀ¶¹â¹âÅÌ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-intel-chips-wont-play-blu-ray-disks-due-to-sgx-deprecation/


CVE-2021-45039£ºÔ¶³Ì´úÂëÖ´ÐÐÎó²î


UniviewרÓÐЭÒé¼àÌýUDP¶Ë¿Ú7788µÄÎó²îÔÊÐíÔ¶³Ìδ¾­Éí·ÝÑéÖ¤µÄʹÓûº³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬¿É»ñµÃ¶Ô×°±¸µÄroot»á¼ûȨ¡£¡£¡£¡£¡£¡£¡£


https://ssd-disclosure.com/ssd-advisory-uniview-preauth-rce/