Sucuri·¢Ã÷´ó¹æÄ£µÄSEO»î¶¯ÒÑÈëÇÖ½ü15000¸öÍøÕ¾
Ðû²¼Ê±¼ä 2022-11-11¾Ý11ÔÂ9ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Sucuri·¢Ã÷Ò»Æð´ó¹æÄ£µÄËÑË÷ÒýÇæÓÅ»¯(SEO)»î¶¯£¬£¬£¬£¬£¬£¬£¬ÈëÇÖÁ˽ü15000¸öÍøÕ¾£¬£¬£¬£¬£¬£¬£¬½«»á¼ûÕßÖØ¶¨Ïòµ½Î±ÔìµÄÎÊ´ðÌÖÂÛÂÛ̳¡£¡£¡£¡£¡£¡£¡£Ã¿¸ö±»¹¥»÷µÄÍøÕ¾¶¼°üÀ¨Ô¼Äª20000¸öÎļþ£¬£¬£¬£¬£¬£¬£¬×÷ΪËÑË÷ÒýÇæÀ¬»øÓʼþ»î¶¯µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼ÍøÕ¾ÊÇWordPress¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»áÐÞ¸ÄWordPressµÄPHPÎļþ£¬£¬£¬£¬£¬£¬£¬Èç'wp-singup.php'ºÍ'wp-cron.php'£¬£¬£¬£¬£¬£¬£¬À´×¢ÈëÖØ¶¨Ïò¡£¡£¡£¡£¡£¡£¡£ÓÐʱ¹¥»÷Õß»áÔÚÄ¿µÄÍøÕ¾ÉÏ·Ö·¢ËûÃÇ×Ô¼ºµÄPHPÎļþ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁËËæ»ú»òαÕýµ±µÄÎļþÃû£¬£¬£¬£¬£¬£¬£¬Èç'wp-logln.php'¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/15-000-sites-hacked-for-massive-google-seo-poisoning-campaign/
2¡¢Mandian¼ì²âµ½APT29Õë¶ÔÅ·ÖÞÍâ½»×éÖ¯µÄ¹¥»÷»î¶¯
MandianÔÚ11ÔÂ8Èճƣ¬£¬£¬£¬£¬£¬£¬APT29Àֳɵش¹ÂÚ¹¥»÷ÁËÒ»¸öÅ·ÖÞµÄÍ⽻ʵÌ壬£¬£¬£¬£¬£¬£¬²¢×îÖÕʹÓÃÁËWindowsƾ֤ÖÜÓΣ¨Credential Roaming£©¹¦Ð§¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022ÄêÍ·APT29ѬȾĿµÄʱ£¬£¬£¬£¬£¬£¬£¬ÊӲ쵽Õë¶ÔActive DirectoryϵͳִÐеĴó×Ú¾ßÓзǵ䷶ÊôÐÔµÄLDAPÅÌÎÊ¡£¡£¡£¡£¡£¡£¡£½øÒ»²½¼ì²é·¢Ã÷£¬£¬£¬£¬£¬£¬£¬´ËÊôÐÔÊÇActive Directoryƾ֤ÖÜÓι¦Ð§µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ç¿µ÷ÁËÒ»¸öí§ÒâÎļþдÈëµ¼ÖµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30170£©£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÎäÆ÷»¯À´Ö´Ðй¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming
3¡¢IceXLoaderÉù³ÆÒÑѬȾȫÇòÊýǧ̨СÎÒ˽¼ÒºÍ×éÖ¯µÄPC
11ÔÂ8ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Ð°汾µÄIceXLoader¿ÉÄÜÒÑѬȾÁËÈ«ÇòÊýǧ̨װ±¸¡£¡£¡£¡£¡£¡£¡£IceXLoaderÓÚ½ñÄê6ÔÂÊ״α»Fortinet·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÉÌÒµ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Æäʱ·¢Ã÷µÄ°æ±¾£¨v3.0£©ËƺõÈÔÔÚ¿ª·¢ÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½üÆÚ·¢Ã÷ÁËÒ»¸ö¹¦Ð§ÆëÈ«ÇÒ°üÀ¨¶à½×¶Î·Ö·¢Á´µÄ°æ±¾£¨v3.3.3£©¡£¡£¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚͨ¹ý´¹ÂÚÓʼþ·¢Ë͵ÄZIPÎļþ£¬£¬£¬£¬£¬£¬£¬Ëü»á·Ö·¢ÏÂÒ»½×¶ÎµÄ¿ÉÖ´ÐÐÎļþSTOREM~2.exe£¬£¬£¬£¬£¬£¬£¬×îÖÕIceXLoader»áʹÓÃÀú³Ì¿ÕÐÄ×¢Èëµ½STREM~2.exeÖС£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÊÜÓ°ÏìµÄ¹«Ë¾×ª´ïÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¶ñÒâÈí¼þµÄ±»¹¥»÷Ä¿µÄµÄÊý¾Ý¿âÈÔÔÚÒ»Ö±¸üС£¡£¡£¡£¡£¡£¡£
https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world/
4¡¢Å·ÖÞÐ̾¯×éÖ¯¾Ð²¶ÉæÏÓ¼ÓÈëLockBitÀÕË÷¹¥»÷µÄÏÓÒÉÈË
Å·ÖÞÐ̾¯×éÖ¯11ÔÂ10ÈÕÐû²¼¾Ð²¶ÁËÒ»ÃûÓëLockBitÀÕË÷¹¥»÷ÓйصÄÏÓÒÉÈË¡£¡£¡£¡£¡£¡£¡£ÕâÃû33ËêµÄÏÓÒÉÈËÃû½ÐMikhail Vasiliev£¬£¬£¬£¬£¬£¬£¬ÓµÓжíÂÞ˹ºÍ¼ÓÄôóË«¹ú¼®£¬£¬£¬£¬£¬£¬£¬ÓÚ10ÔÂ26ÈÕÔÚ¼ÓÄô󰲼òªʡ±»²¶¡£¡£¡£¡£¡£¡£¡£Ö´·¨Ö°Ô±´ÓÆä¼ÒÖвé»ñÁË8̨µçÄÔºÍ32¸öÍâÖÃÓ²ÅÌ¡¢Á½°ÑǹºÍ¼ÛÖµ40ÍòÅ·ÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£ËäȻŷÖÞÐ̾¯×éÖ¯½«ÆäÐÎòΪLockBitµÄÔËÓªÖ°Ô±£¬£¬£¬£¬£¬£¬£¬µ«ËûºÜ¿ÉÄÜÊÇ×÷Ϊ¸Ã»î¶¯µÄÁ¥Êô»ú¹¹¶ø·ÇÖÎÀíÕß¡£¡£¡£¡£¡£¡£¡£ËûÏÖÔÚÕýÔÚÆÚ´ýÒòÉæÏÓ¼ÓÈëLockBitÀÕË÷¹¥»÷¶ø±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/
5¡¢Trend MicroÐû²¼¹ØÓÚEarth LongzhiÍÅ»ïµÄÆÊÎö±¨¸æ
Trend MicroÔÚ11ÔÂ9ÈÕÐû²¼Á˹ØÓÚEarth LongzhiÍÅ»ïµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï´Ó2020Äê¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬Ê¹Óö¨Öư汾µÄCobalt Strike¼ÓÔØ³ÌÐòÔÚÄ¿µÄÖÐÖ²ÈëºóÃÅ¡£¡£¡£¡£¡£¡£¡£Ëü»¹ÓëEarth BakuÓÐÏàËÆµÄTTP£¬£¬£¬£¬£¬£¬£¬Á½Õß¶¼±»ÒÔΪÊÇAPT41×Ó×éÖ¯¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯µÚÒ»´Î»î¶¯±¬·¢ÔÚ2020Äê5ÔÂÖÁ2021Äê2Ô£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃSymatic¹¥»÷Öйų́ÍåµÄÕþ¸®¡¢Ò½ÁƱ£½¡ºÍѧÊõµÈÐÐÒµ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ´Î»î¶¯´Ó2021Äê8ÔÂÒ»Á¬µ½2022Äê6Ô£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃCroxLoader¡¢BigpipeLoaderºÍOutLoaderµÈ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÌ©¹ú¡¢ÂíÀ´Î÷ÑǺÍÓ¡¶ÈÄáÎ÷Ñǵȹú¼ÒµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html
6¡¢Check PointÐû²¼PyPIÉ϶ñÒâ°ü»ìÏý·½·¨µÄÆÊÎö±¨¸æ
11ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Check Point͸¶Æä¼ì²âµ½Ò»¸öеĶñÒâ³ÌÐò°ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÒþ²ØÍ¼ÏñÖеĴúÂ벢ͨ¹ýGithubÉϵĿªÔ´ÏîĿѬȾPyPIÓû§¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ°üÃûΪapicolor£¬£¬£¬£¬£¬£¬£¬¿´ËÆÊǸöͨË׵İü£¬£¬£¬£¬£¬£¬£¬µ«Ëü»áÏÈÊÖ¶¯×°ÖÃÁ½¸ö°ürequestsºÍjudyb¡£¡£¡£¡£¡£¡£¡£judyb´úÂëÊÇÒ»¸öÒþдģ¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬ÈÏÕæÒþ²ØºÍÏÔʾͼƬÖеÄÒþ²ØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Óû§ÔÚËÑË÷²¢×°ÖÃÕâЩ¿ªÔ´ÏîĿʱ£¬£¬£¬£¬£¬£¬£¬²¢²»ÖªµÀÆäÖÐÒþ²Ø×ŶñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬PyPIÔÚÊÕµ½Check PointµÄ±¨¸æºóɾ³ýÁËapicolor°ü¡£¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2022/check-point-cloudguard-spectral-exposes-new-obfuscation-techniques-for-malicious-packages-on-pypi/