Cash³ÆÆä820ÍòµÄÓû§ÐÅÏ¢ÒÑй¶ ÄÚ²¿Ô±¹¤Î¥¹æÏÂÔØ

Ðû²¼Ê±¼ä 2022-04-08

Cash³ÆÆä820ÍòµÄÓû§ÐÅÏ¢ÒÑй¶ £¬£¬ £¬£¬ £¬£¬ £¬ÄÚ²¿Ô±¹¤Î¥¹æÏÂÔØ


¾ÝýÌå4ÔÂ5ÈÕ±¨µÀ £¬£¬ £¬£¬ £¬£¬ £¬Cash App 820ÍòµÄÓû§ÐÅÏ¢ÒÑй¶ ¡£¡£ ¡£¡£¡£¡£Cash AppµÄĸ¹«Ë¾Block,Inc.ÔÚÌá½»µÄ8-K±í¸ñÖÐÌåÏÖ £¬£¬ £¬£¬ £¬£¬ £¬ÊÂÎñ±¬·¢ÔÚ2021Äê12ÔÂ10ÈÕ £¬£¬ £¬£¬ £¬£¬ £¬ÆäÒ»¸öǰԱ¹¤ÔÚÈ¥Ö°ºóÏÂÔØÁËCash AppµÄÄÚ²¿±¨¸æ ¡£¡£ ¡£¡£¡£¡£´Ë´Îй¶ÁËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ £¬£¬ £¬£¬ £¬£¬ £¬ÒÔ¼°ÆäÔÚCash AppÉϵÄͶ×ʻÏà¹ØµÄÐÅÏ¢ £¬£¬ £¬£¬ £¬£¬ £¬Èç³Ö¹ÉÁ¿ºÍÉúÒâ»î¶¯µÈ ¡£¡£ ¡£¡£¡£¡£BlockÌåÏÖ £¬£¬ £¬£¬ £¬£¬ £¬ÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜй¶ÊÂÎñÓ°ÏìµÄ820Íò¿Í»§ÓйشËʵĸü¶àÐÅÏ¢ ¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cash-app-notifies-82-million-us-customers-about-data-breach/


ÎÚ¿ËÀ¼CERT-UA·¢Ã÷ArmageddonÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷»î¶¯


ýÌå4ÔÂ5ÈÕ³Æ £¬£¬ £¬£¬ £¬£¬ £¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)·¢Ã÷ÁËArmageddon(Gamaredon)еĴ¹Âڻ ¡£¡£ ¡£¡£¡£¡£¸Ã»ú¹¹ÒѾ­È·¶¨ÁËÁ½¸ö×ÔÁ¦µÄ°¸¼þ £¬£¬ £¬£¬ £¬£¬ £¬Ò»¸öÕë¶ÔÎÚ¿ËÀ¼µÄ×éÖ¯ £¬£¬ £¬£¬ £¬£¬ £¬ÁíÒ»¸öÕë¶ÔÅ·Ã˵ÄÕþ¸®»ú¹¹ ¡£¡£ ¡£¡£¡£¡£Õë¶ÔÎÚ¿ËÀ¼µÄ»î¶¯ÒÔ¶íÂÞ˹ս·¸ÐÅϢΪÓÕ¶ü £¬£¬ £¬£¬ £¬£¬ £¬Ê¹Óø½ÓÐHTMLÎļþµÄ´¹ÂÚÓʼþ·Ö·¢¶ñÒâÈí¼þ£»£»£»Õë¶ÔÅ·Ã˵ĻÒÔ¾üʺÍÈËÐÔÖ÷Òå¾ÈÖúΪÌâ £¬£¬ £¬£¬ £¬£¬ £¬Í¨¹ýÒ»¸öRAR¸½¼þ·Ö·¢¶ñÒâÈí¼þ ¡£¡£ ¡£¡£¡£¡£ArmageddonÓë¶íÂÞ˹FSBÓÐ¹Ø £¬£¬ £¬£¬ £¬£¬ £¬×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾ ¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ukraine-spots-russian-linked-armageddon-phishing-attacks/


ContiÍÅ»ïй¶´ÓParker HannifinÇÔÈ¡µÄÊýGBÎļþ


ýÌå4ÔÂ5ÈÕ±¨µÀ³Æ £¬£¬ £¬£¬ £¬£¬ £¬ÃÀ¹ú¹¤Òµ¹«Ë¾Parker Hannifin´ó×ÚÊý¾Ýй¶ ¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ҪΪº½¿Õº½Ìì¡¢ÒÆ¶¯ºÍ¹¤ÒµÁìÓòµÄ×éÖ¯ÌṩϸÃܹ¤³Ì½â¾ö¼Æ»® ¡£¡£ ¡£¡£¡£¡£ËüÔÚ3ÔÂ14ÈÕ¼ì²âµ½ÏµÍ³Ôâµ½ÈëÇÖ £¬£¬ £¬£¬ £¬£¬ £¬Ö®ºóÁ¬Ã¦¹Ø±Õ²¿·Öϵͳ²¢Õö¿ªÊÓ²ì ¡£¡£ ¡£¡£¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬£¬ £¬£¬ £¬£¬ £¬µ«ÒÑÈ·¶¨°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵIJ¿·ÖÊý¾ÝÒѾ­Ð¹Â¶ ¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ £¬£¬ £¬£¬ £¬£¬ £¬ContiÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæÁË´ÓParkerÇÔÈ¡µÄÁè¼Ý5GBÊý¾Ý £¬£¬ £¬£¬ £¬£¬ £¬²¢³ÆÕâ½öΪ±»µÁÊý¾ÝµÄ3% ¡£¡£ ¡£¡£¡£¡£


https://www.securityweek.com/ransomware-gang-leaks-files-stolen-industrial-giant-parker-hannifin


Ó¢¹úThe WorksÔâµ½¹¥»÷ºó²¿·ÖÁãÊÛÊÐËÁÔÝʱ¹ØÃÅ


¾Ý4ÔÂ5ÈÕ±¨µÀ £¬£¬ £¬£¬ £¬£¬ £¬Ó¢¹úThe Works³ÆÆäϵͳÔâµ½²»·¨»á¼û £¬£¬ £¬£¬ £¬£¬ £¬µ¼Ö²¿·ÖÁãÊÛÊÐËÁÔÝʱ¹ØÃÅ ¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¢¹úºÍ°®¶ûÀ¼ÓµÓÐ530¼ÒÃÅµê £¬£¬ £¬£¬ £¬£¬ £¬ÏúÊÛÊé¼®¡¢Íæ¾ß¡¢Îľߡ¢ÒÕÊõÆ·ºÍ¹¤ÒÕÖÊÁÏµÈ £¬£¬ £¬£¬ £¬£¬ £¬ÄêÊÕÈëԼΪ3ÒÚÃÀÔª ¡£¡£ ¡£¡£¡£¡£The Works²¢Î´Åû¶¹ØÓÚ´Ë´Îʱ¼äµÄ¸ü¶àϸ½Ú £¬£¬ £¬£¬ £¬£¬ £¬µ«ÆäÅäËÍЧÀÍÊܵ½Ó°Ïì £¬£¬ £¬£¬ £¬£¬ £¬ÓÐЩÃŵêÖ»ÄܽÓÊÜÏֽ𠡣¡£ ¡£¡£¡£¡£²¿·ÖýÌ屨µÀ £¬£¬ £¬£¬ £¬£¬ £¬¸ÃÊÂÎñÔ´ÓÚÒ»ÃûÔ±¹¤Ôâµ½¶ñÒâÓʼþµÄ¹¥»÷ £¬£¬ £¬£¬ £¬£¬ £¬µ¼Ö¹«Ë¾µÄϵͳѬȾÀÕË÷Èí¼þ ¡£¡£ ¡£¡£¡£¡£  


https://www.bitdefender.com/blog/hotforsecurity/the-works-hit-by-hackers-uk-retailer-shuts-some-stores-after-problems-with-payment-tills/


SymantecÐû²¼CicadaÍÅ»ï½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


4ÔÂ5ÈÕ £¬£¬ £¬£¬ £¬£¬ £¬SymantecÐû²¼ÁËCicada£¨ÓÖÃûAPT10£©½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ ¡£¡£ ¡£¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2021ÄêÄêÖÐ £¬£¬ £¬£¬ £¬£¬ £¬Ö÷ÒªÕë¶Ô¶à¸ö¹ú¼Ò£¨Éæ¼°Å·ÖÞ¡¢ÑÇÖ޺ͱ±ÃÀ£©µÄÕþ¸®¡¢Ö´·¨¡¢×ڽ̺ͷÇÕþ¸®×éÖ¯(NGO) ¡£¡£ ¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýδÐÞ¸´µÄMicrosoft ExchangeЧÀÍÆ÷»ñµÃ³õʼ»á¼ûȨÏÞ £¬£¬ £¬£¬ £¬£¬ £¬²¢Ê¹ÓúóÃÅSodamasterµÈ¶ñÒâÈí¼þʵÑé¹¥»÷ ¡£¡£ ¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬ £¬£¬ £¬¹¥»÷Õß»¹Í¨¹ýDLL²àÔØÊÖÒÕ £¬£¬ £¬£¬ £¬£¬ £¬Ê¹ÓÃÕýµ±µÄVLCýÌå²¥·ÅÆ÷À´×°ÖÃ×Ô½ç˵¼ÓÔØ³ÌÐò ¡£¡£ ¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/cicada-apt10-china-ngo-government-attacks


MalwarebytesÐû²¼Colibri LoaderлµÄÑо¿±¨¸æ


MalwarebytesÔÚ4ÔÂ5ÈÕÐû²¼ÁËColibri LoaderлµÄÑо¿±¨¸æ ¡£¡£ ¡£¡£¡£¡£ÕâÊÇÒ»¸öÏà¶Ô½ÏеĶñÒâÈí¼þ £¬£¬ £¬£¬ £¬£¬ £¬ÓÚ2021Äê8ÔÂÊ״ηºÆðÔÚºÚ¿ÍÂÛ̳ÉÏ £¬£¬ £¬£¬ £¬£¬ £¬ÓÃÓÚ·Ö·¢ºÍÖÎÀípayload ¡£¡£ ¡£¡£¡£¡£´Ë´Î»î¶¯Ê¹ÓÃÁ˶ñÒâWordÎĵµ £¬£¬ £¬£¬ £¬£¬ £¬×îÖÕÖ¼ÔÚ·Ö·¢Vidar Stealer ¡£¡£ ¡£¡£¡£¡£ÎĵµÏÈÓëλÓÚ(securetunnel[.]co)µÄÔ¶³ÌЧÀÍÆ÷ÅþÁ¬ £¬£¬ £¬£¬ £¬£¬ £¬ÒÔ¼ÓÔØÃûΪtrkal0.dotµÄÔ¶³ÌÄ£°å £¬£¬ £¬£¬ £¬£¬ £¬¸ÃÄ£°åÓë¶ñÒâºêÁªÏµÀ´Ê¹PowerShellÒÔsetup.exeµÄÐÎʽÏÂÔØColibri Loader ¡£¡£ ¡£¡£¡£¡£


https://blog.malwarebytes.com/threat-intelligence/2022/04/colibri-loader-combines-task-scheduler-and-powershell-in-clever-persistence-technique/    




Çå¾²¹¤¾ß


Process Overwriting


PE×¢ÈëÊÖÒÕ £¬£¬ £¬£¬ £¬£¬ £¬ÓëProcess Hollowing ºÍ Module OverloadingÇ×½üÏà¹Ø ¡£¡£ ¡£¡£¡£¡£


https://github.com/hasherezade/process_overwriting


jfscan v1.1.8 


»ùÓÚ Masscan ºÍ NMap µÄ³¬¿ìËٺͿɶ¨ÖƵĶ˿ÚɨÃèÆ÷ ¡£¡£ ¡£¡£¡£¡£


https://github.com/nullt3r/jfscan


Auto-Elevate


´Ë¹¤¾ßÑÝʾÁË UAC ÈÆ¹ýµÄǿʢ¹¦Ð§ºÍ Windows µÄÄÚÖù¦Ð§ ¡£¡£ ¡£¡£¡£¡£


https://github.com/FULLSHADE/Auto-Elevate


Subdomains.Sh


subdomains.sh°ü×°ÓÃÓÚ×ÓÓòö¾ÙµÄ¹¤¾ß £¬£¬ £¬£¬ £¬£¬ £¬ÒÔÔÚ¸ø¶¨ÓòÉÏ×Ô¶¯»¯ÊÂÇéÁ÷ ¡£¡£ ¡£¡£¡£¡£


https://github.com/enenumxela/subdomains.sh




Çå¾²ÆÊÎö


Ó¢ÌØ¶û¹Ø±ÕÔÚ¶íÂÞ˹µÄËùÓÐÓªÒµÔËÓª


https://www.bleepingcomputer.com/news/technology/intel-shuts-down-all-business-operations-in-russia/


Mandiant ¹É¶«ÆðËß×èÖ¹¹È¸è 5.4 ÒÚÃÀÔªµÄÉúÒâ


https://www.theregister.com/2022/04/04/mandiant_google_lawsuit/


΢Èí½«ÍâµØ Exchange¡¢SharePoint Ìí¼Óµ½Îó²îÉͽðÍýÏë


https://www.bleepingcomputer.com/news/security/microsoft-adds-on-premises-exchange-sharepoint-to-bug-bounty-program/


΢ÈíÐû²¼Ð嵀 Windows 11 Çå¾²¡¢¼ÓÃܹ¦Ð§


https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-new-windows-11-security-encryption-features/


Rockwell PLC ÖеÄÑÏÖØÎó²î¿ÉÄÜÓÃÀ´Ö²Èë¶ñÒâ´úÂë


https://thehackernews.com/2022/04/critical-bugs-in-rockwell-plc-could.html


Spring4Shell (CVE-2022-22965)£ºÏêϸÐÅÏ¢»ººÍ½â²½·¥


https://securelist.com/spring4shell-cve-2022-22965/106239/