Symantec·¢Ã÷SlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2022-03-03

Symantec·¢Ã÷SlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯


2ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬SymantecÐû²¼Ò»·Ý±¨¸æÏêÊöÁËSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£DaxinÊÇÒ»¸öWindowsÄÚºËÇý¶¯³ÌÐò£¬£¬£¬£¬£¬£¬£¬×Ô2019Äê11ÔÂ×îÏȱ»ÓÃÓÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ2021Äê11ÔÂÊӲ쵽Æä×î½üÒ»´Î¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Õë¶ÔµçÐÅ¡¢½»Í¨ºÍÖÆÔìÐÐÒµ¡£¡£¡£¡£¡£¡£¡£¸ÃºóÞßÓÐÇÔÈ¡Êý¾Ý¡¢Ö´ÐÐÏÂÁî»òÏÂÔØºÍ×°ÖÃÆäËü¶ñÒâÈí¼þµÄ¹¦Ð§£»£»£»¿ÉÒÔÐ®ÖÆÕýµ±µÄTCP/IPÅþÁ¬¾ÙÐÐͨѶ£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â£»£»£»»¹ÄÜÔÚÄ¿µÄÖÐ×°ÖÃÆäËü×é¼þÀ´ÔöÇ¿ÄÚÖù¦Ð§£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÃûΪ\\.\Tcp4µÄ×°±¸Îª´ËÀà×é¼þÌṩרÓÃͨѶ»úÖÆ¡£¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage



¼ÑÄܵÄ×Ó¹«Ë¾AxisÔâµ½¹¥»÷µ¼Ö²¿·ÖϵͳÔÝʱÖÐÖ¹


¾ÝýÌå2ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Èðµä¹«Ë¾Axis CommunicationsÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿·ÖϵͳÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£AxisÊǼÑÄܵÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬2019ÄêÓªÒµÊÕÈëÁè¼Ý12.35ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÓÚ2021Äê2ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦¶Ô´ËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£ÊÓ²ìÓÚ2ÔÂ27ÈÕÍê³É£¬£¬£¬£¬£¬£¬£¬Ð§¹ûÏÔʾûÓÐЧÀÍÆ÷±»¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬Ò²Ã»Óпͻ§ÐÅÏ¢Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÉ繤¹¥»÷¿ØÖÆÁËÒ»ÃûÔ±¹¤µÄÕË»§£¬£¬£¬£¬£¬£¬£¬²¢ÔÚûÓд¥·¢Èκξ¯±¨µÄÇéÐÎÏÂÈëÇÖÁËϵͳ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄ²Ù×÷ϵͳºÍÓ¦ÓóÌÐòÈÔ´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬£¬£¬Camera StationÔÊÐíϵͳҲÎÞ·¨Ê¹Óᣡ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/axis-communications-shares-details-on-disruptive-cyberattack/



CISAÐû²¼Éæ¼°Ê©ÄÍµÂµçÆøÖжà¸öÎó²îµÄICSÇ徲ͨ¸æ


CISAÓÚ2ÔÂ24ÈÕÐû²¼ÁËÒ»ÔòICSÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ê©ÄÍµÂµçÆøEasergyÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨Ó²±àÂëÆ¾Ö¤Ê¹ÓÃÎó²î£¨CVE-2022-22722£©»ººÍ³åÇøÒç³öÎó²î£¨CVE-2022-22723ºÍCVE-2022-22725£©¡£¡£¡£¡£¡£¡£¡£Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓÃÕâЩÎó²î¿ÉÄÜ»áй¶װ±¸Æ¾Ö¤¡¢µ¼ÖÂDoS״̬¡¢×°±¸ÖØÆô»òÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆÖмÌ¡£¡£¡£¡£¡£¡£¡£Ê©ÄÍµÂµçÆøÔÚ2022Äê1ÔÂ11ÈÕÍÆ³öµÄ¸üÐÂÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-03



ÒÁÀÊUNC3313ʹÓÃ2¸öкóÃŹ¥»÷Öж«µÄijÕþ¸®»ú¹¹


MandiantÔÚ2ÔÂ24ÈÕÐû²¼µÄ±¨¸æÅû¶ÁËÒÁÀÊUNC3313ʹÓõÄ2¸öкóÃŵÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2021Äê11Ô¼ì²âµ½UNC3313Õë¶ÔÖж«Ä³Õþ¸®»ú¹¹µÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊÓ²ìÀú³ÌÖз¢Ã÷ÁËеĶñÒâÈí¼þGRAMDOORºÍSTARWHALE¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬STARWHALEÊÇÒ»¸öWindows¾ç±¾Îļþ(.WSF)£¬£¬£¬£¬£¬£¬£¬Ö´ÐдÓÓ²±àÂëC2ЧÀÍÆ÷ÎüÊÕµ½µÄÏÂÁ£»£»GRAMDOOR±»°²ÅÅΪNSIS×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÉèÖÃWindows Run×¢²á±íÏîʵÏÖ³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£


https://www.mandiant.com/resources/telegram-malware-iranian-espionage



¼ÓÖÝ״ʦЭ»áState BarµÄ26ÍòÆð°¸¼þ¼Í¼й¶


ýÌå2ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖÝ״ʦЭ»áState BarÔ¼26Íò·Ý·Ç¹ûÕæµÄ°¸¼þ¼Í¼±»Ðû²¼ÔÚJudyrecords.com¡£¡£¡£¡£¡£¡£¡£¸Ã¾ÛºÏÍøÕ¾´Ó¶à¸öÖ´·¨»ú¹¹Êý¾Ý¿âÍøÂç¹ûÕæµÄ·¨Í¥¼Í¼£¬£¬£¬£¬£¬£¬£¬ËѼ¯ÁËÁè¼Ý6.3Òڷݼͼ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÂÎñÔ´ÓÚ°¸¼þÖÎÀíϵͳÖб£´æÒ»¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂJudyrecordsÔÚ»á¼û¹«¹²¼Í¼ʱÎÞÒâÖÐץȡµ½Á˷ǹûÕæ¼Í¼¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþÒѱ»´ÓÍøÕ¾ÖÐɾ³ý¡£¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2022/02/28/ca_legal_leak/



Akamai·¢Ã÷ÐÂDDoS¹¥»÷ģʽ¿É·Å´ó65±¶


3ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬AkamaiÐû²¼±¨¸æ³Æ¼ì²âµ½ÐÂDDoS¹¥»÷ģʽTCP Middlebox Reflection¿É·Å´ó65±¶¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷Õë¶ÔÊý¾Ý°ü¼ì²éºÍÄÚÈݹýÂË×°±¸£¬£¬£¬£¬£¬£¬£¬¾ßÓÐ33×Ö½ÚpayloadµÄSYNÊý¾Ý°ü¿É´¥·¢2156×Ö½ÚµÄÏìÓ¦£¬£¬£¬£¬£¬£¬£¬·Å´óÁË6533%¡£¡£¡£¡£¡£¡£¡£AkamaiÔÚÕë¶ÔÒøÐС¢ÂÃÓΡ¢ÓÎÏ·¡¢Ã½ÌåºÍWeb ÍйÜЧÀÍÌṩÉ̵ĻÖж¼¼ì²âµ½ÁË´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÏÖÔÚ´ËÀ๥»÷µÄ¹æÄ£ÉÐС£¡£¡£¡£¡£¡£¡£¨·åֵΪ11GbpsºÍ1.5Mpps£©£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÔÚ¾ÙÐÐ΢µ÷ºóÕÒµ½×î¼Ñ·´ÉäģʽֻÊÇʱ¼äÎÊÌâ¡£¡£¡£¡£¡£¡£¡£


https://www.akamai.com/blog/security/tcp-middlebox-reflection#.Yh41hIhUsH0.twitter




Çå¾²¹¤¾ß


Katoolin3 


¿ÉÒÔ½« Kali Linux ÖпÉÓõÄËùÓгÌÐò´øµ½ Debian ºÍ Ubuntu¡£¡£¡£¡£¡£¡£¡£


https://github.com/s-h-3-l-l/katoolin3



openSquat 


ÊÇÒ»ÖÖ¿ªÔ´Ç鱨 (OSINT) Çå¾²¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚʶ±ð¶ÔÌØ¶¨¹«Ë¾»òÓòµÄÇÀ×¢Íþв¡£¡£¡£¡£¡£¡£¡£


https://github.com/atenreiro/opensquat



CloudGraph


ÊÇÊÊÓÃÓÚ AWS¡¢Azure¡¢GCP ºÍ K8s µÄÃâ·Ñ¿ªÔ´Í¨Óà GraphQL API ºÍÔÆÇ徲״̬ÖÎÀí (CSPM) ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£


https://github.com/cloudgraphdev/cli



Nimcrypt2


Óà Nim ±àдµÄ .NET¡¢PE ºÍԭʼ Shellcode ´ò°ü³ÌÐò/¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£¡£


https://github.com/icyguider/Nimcrypt2



moonwalk


ͨ¹ýÔÚϵͳÈÕÖ¾ºÍÎļþϵͳʱ¼ä´ÁÉÏɨ³ýºÛ¼££¬£¬£¬£¬£¬£¬£¬ÔÚ Linux Îó²îʹÓÃ/ÉøÍ¸²âÊÔʱ´úÁýÕÖ×Ù¼£¡£¡£¡£¡£¡£¡£¡£


https://github.com/mufeedvh/moonwalk




Çå¾²ÆÊÎö


ÎÚ¿ËÀ¼Ñо¿Ö°Ô±Ð¹Â¿àÕË÷Èí¼þ Conti µÄÔ´´úÂë


https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/



ÀÕË÷Èí¼þ BlackCat ÆÊÎö±¨¸æ


https://cybersecurity.att.com/blogs/labs-research/blackcat-ransomware



Namecheap ÖÕֹΪ¶íÂÞ˹×éÖ¯ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇ×ªÒÆÓòÃû


https://www.bleepingcomputer.com/news/technology/namecheap-terminates-services-for-russians-asks-them-to-move-domains/



΢Èí£ºÎÚ¿ËÀ¼ÔÚÈëÇÖǰÊýСʱ¾ÍÔâÊÜÁËÐ嵀 FoxBlade ¶ñÒâÈí¼þ¹¥»÷


https://securityaffairs.co/wordpress/128538/cyber-warfare-2/foxblade-malware-used-hours-before-invasion.html



CISAºÍFBÖÒÑÔÕë¶ÔÎÚ¿ËÀ¼µÄÊý¾Ý²Á³ý¹¥»÷¿ÉÄÜ»áÉìÕŵ½ÆäËü¹ú¼Ò


https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-potential-data-wiping-attacks-spillover/



Emotet µÄÖØÉú£º½©Ê¬ÍøÂçµÄй¦Ð§¼°Æä¼ì²âÒªÁì


https://thehackernews.com/2022/02/reborn-of-emotet-new-features-of-botnet.html