Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú

Ðû²¼Ê±¼ä 2022-03-02

Òò¹©Ó¦ÉÌÔâµ½¹¥»÷£¬£¬£¬ £¬£¬ £¬£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú


ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼£¬£¬£¬ £¬£¬ £¬£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ×îÏÈ£¬£¬£¬ £¬£¬ £¬£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÆäÖ÷ÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ£¬£¬£¬ £¬£¬ £¬£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬ £¬£¬ £¬£¬´Ë´ÎÊÂÎñ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5%£¬£¬£¬ £¬£¬ £¬£¬Ô¼ºÏ13000Á¾Æû³µ¡£¡£¡£¡£¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú£¬£¬£¬ £¬£¬ £¬£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄÏêϸӰÏì¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ £¬£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖÐÖ¹»áÒ»Á¬¶à¾Ã¡£¡£¡£¡£¡£


https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/


°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓÐЧÀÍÖÐÖ¹


¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ £¬£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂ磬£¬£¬ £¬£¬ £¬£¬²¢¹Ø±ÕËùÓÐЧÀÍ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ £¬£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨»á¼û£¬£¬£¬ £¬£¬ £¬£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½£¬£¬£¬ £¬£¬ £¬£¬Õâ¶ÔÁгµµÄÔËÓª±¬·¢Á˼«´óµÄÓ°Ïì¡£¡£¡£¡£¡£¼¸ÈÕǰ£¬£¬£¬ £¬£¬ £¬£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr£¬£¬£¬ £¬£¬ £¬£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html


Ñо¿ÍŶӷ¢Ã÷Õë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯


¾Ý2ÔÂ24Èյı¨µÀ£¬£¬£¬ £¬£¬ £¬£¬Bitdefender·¢Ã÷Á˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ£¬£¬£¬ £¬£¬ £¬£¬ÒÔÕË»§¶³½áΪÓÕ¶ü£¬£¬£¬ £¬£¬ £¬£¬ÓÕʹĿµÄµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄ´¹ÂÚÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂ룬£¬£¬ £¬£¬ £¬£¬Ö¼ÔÚÇÔȡĿµÄÒøÐÐÕË»§ÖеÄÓà¶î¡£¡£¡£¡£¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý£¬£¬£¬ £¬£¬ £¬£¬´ó²¿·Ö´¹ÂÚÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£©£¬£¬£¬ £¬£¬ £¬£¬Æä´ÎΪӢ¹ú£¨7%£©£»£»£»£» £»´ó²¿·ÖÓʼþÀ´×ÔÃÀ¹úµÄIPµØµã£¨40%£©£¬£¬£¬ £¬£¬ £¬£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/


Ñо¿Ö°Ô±¹ûÕæÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄ̸Ìì¼Í¼


2ÔÂ27ÈÕ±¨µÀ³Æ£¬£¬£¬ £¬£¬ £¬£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõ̸Ìì¼Í¼¹ûÕæ¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬£¬ £¬£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿Ö°Ô±Ð¹Â¶µÄ£¬£¬£¬ £¬£¬ £¬£¬Ëû¿ÉÒÔ»á¼ûContiµÄXMPP̸ÌìЧÀÍÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë£¬£¬£¬ £¬£¬ £¬£¬×ܹ²ÓÐ393¸öJSONÎļþ£¬£¬£¬ £¬£¬ £¬£¬°üÀ¨2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÐÂÎÅ¡£¡£¡£¡£¡£ÕâЩ¼ÍÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖֻµÄÐÅÏ¢£¬£¬£¬ £¬£¬ £¬£¬°üÀ¨ÒÔǰδ¹ûÕæµÄ±»¹¥»÷Ä¿µÄ¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØµãÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/


CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ


2ÔÂ24ÈÕ£¬£¬£¬ £¬£¬ £¬£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð£¬£¬£¬ £¬£¬ £¬£¬ÒѸüÐÂÁËÆß´Î¡£¡£¡£¡£¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬ £¬£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ£¬£¬£¬ £¬£¬ £¬£¬Í¨¹ýÍøÂç´¹ÂÚµç×ÓÓʼþ½øÈëÄ¿µÄϵͳ¡£¡£¡£¡£¡£ÆäÁ¬ÏµÁËÇÔÈ¡³ÌÐò¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§£¬£¬£¬ £¬£¬ £¬£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨѶ£¬£¬£¬ £¬£¬ £¬£¬Ö§³ÖTorÍøÂ磬£¬£¬ £¬£¬ £¬£¬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots£¬£¬£¬ £¬£¬ £¬£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£¡£¡£¡£¡£


https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/


Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄÆÊÎö±¨¸æ


¾Ý2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ £¬£¬Intel 471Åû¶Á˰´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд£¬£¬£¬ £¬£¬ £¬£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨѶÀ´¼ìË÷¶ñÒâpayloadµÄURL£¬£¬£¬ £¬£¬ £¬£¬²¢×°ÖÃÔÚÄ¿µÄÖ÷»úÉÏ£¬£¬£¬ £¬£¬ £¬£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢£¬£¬£¬ £¬£¬ £¬£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£¡£¡£¡£¡£Í¨³£ÒÀÀµ¾­ÓÉSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾¾ÙÐзַ¢£¬£¬£¬ £¬£¬ £¬£¬¿É×°Öò¢Ö´ÐжàÖÖ¶ñÒâpayload£¬£¬£¬ £¬£¬ £¬£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£¡£¡£¡£¡£


https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/




Çå¾²¹¤¾ß


DRAKVUF Sandbox


×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þÆÊÎöϵͳ£¬£¬£¬ £¬£¬ £¬£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ£¬£¬£¬ £¬£¬ £¬£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£¡£¡£¡£¡£


https://github.com/CERT-Polska/drakvuf-sandbox


StayKit


Cobalt Strike ³¤ÆÚÐÔµÄÀ©Õ¹£¬£¬£¬ £¬£¬ £¬£¬ËüʹÓà SharpStay .NET ³ÌÐò¼¯µÄ execute_assembly º¯Êý¡£¡£¡£¡£¡£


https://github.com/0xthirteen/StayKit


Fennec


Óà Rust ±àдµÄ¹¤¼þÍøÂ繤¾ß£¬£¬£¬ £¬£¬ £¬£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄÊÂÎñÏìӦʱ´úʹÓᣡ£¡£¡£¡£


https://github.com/AbdulRhmanAlfaifi/Fennec


request smuggler


Http ÇëÇó×ß˽Îó²îɨÃèÆ÷£¬£¬£¬ £¬£¬ £¬£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽Îó²î¹¥»÷µÄЧÀÍÆ÷¡£¡£¡£¡£¡£


https://github.com/Sh1Yo/request_smuggler


Shellcode Template


ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£¡£¡£¡£¡£


https://github.com/Cracked5pider/ShellcodeTemplate




Çå¾²ÆÊÎö


CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/


ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â


https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/


ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã


https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/


΢ÈíÐû²¼ÔÚ Windows 11 ÖоÙÐÐÐ嵀 Windows ¸üÐÂË¢ÐÂ


https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml