±ÈÀûʱÄÚÕþ²¿³ÆÆäÔâµ½ÅÓ´óµÄ¹¥»÷£¬ÒÉËÆÊǼäµý»î¶¯£»SentinelOne·¢ÏÖÒÁÀÊAgriusÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯
Ðû²¼Ê±¼ä 2021-05-271.±ÈÀûʱÄÚÕþ²¿³ÆÆäÔâµ½ÅÓ´óµÄ¹¥»÷£¬ÒÉËÆÊǼäµý»î¶¯
±ÈÀûʱÄÚÕþ²¿ÓÚ±¾Öܶþ³ÆÆäÔâµ½ÁËÅÓ´óµÄ¹¥»÷£¬ÒÉËÆÊǼäµý»î¶¯¡£¾ÝϤ£¬´Ë´Î¹¥»÷¿ªÊ¼ÓÚ2019Ä꣬µ«Ö±µ½½ñÄê3Ô²ű»·¢ÏÖ¡£±ÈÀûʱÕþ¸®ÒѶԴËÊÂÕ¹¿ªÊӲ죬À´È·¶¨¹¥»÷µÄÆðÔ´¡¢ÊÜÓ°ÏìÊý¾ÝµÄ·¶Î§ÒÔ¼°ÊÇ·ñÉæ¼°Íâ¹úÊÆÁ¦¡£Ñо¿ÈËÔ±³Æ£¬¸Ã¹¥»÷µÄÄ¿µÄ²»ÊÇÖжÏÍøÕ¾»òË÷ÒªÊê½ð£¬ËüÔ½·¢ÅÓ´óÇÒÕë¶ÔÐÔÇ¿£¬Òò´Ë»³ÒÉÕâÊÇÒ»´Î¼äµý»î¶¯¡£½ñÄê5Ô³õ±ÈÀûʱ»¹Ôâµ½ÁËÁíÒ»´Î´ó¹æÄ£¹¥»÷µ¼ÖÂBelnetÍøÂçÖжϣ¬Ó°ÏìÁ˸ùúµÄ½ÌÓý»ú¹¹¡¢´óѧ¡¢Ñо¿ÖÐÐĺ͹«¹²¹ÜÀí²¿ÃÅ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118275/breaking-news/belgium-interior-ministry-cyber-attack.html
2.SentinelOne·¢ÏÖÒÁÀÊAgriusÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯
SentinelLabsÑо¿ÈËÔ±·¢ÏÖÒÁÀÊ´Ó2020Äê12Ô¿ªÊ¼½«ÒÔÉ«ÁÐ×÷Ϊ¹¥»÷Ä¿±ê¡£×î³õ£¬¸ÃÍÅ»ïʹÓÃÁË´ÅÅ̲Á³ýÆ÷DEADWOOD£¨ÓÖÃûDetbosit£©£¬Ö¼ÔÚÆÆ»µÊÜѬȾÉè±¹ØÁ¬ÄÊý¾Ý£¬Ö®ºóÓÖʹÓÃÁ˾ßÓÐÀÕË÷¹¦Ð§µÄApostle¡£Ñо¿ÈËÔ±ÈÏΪ£¬Æä¼ÓÃܹ¦Ð§½öÊÇΪÁËÑÚ¸ÇÆäÏëÒªÏú»ÙÊܺ¦ÕßÊý¾ÝµÄʵ¼ÊÒâͼ¡£´ËÍ⣬¹¥»÷Õß»¹Ê¹ÓÃÁ˶àÖÖ¹¥»÷ý½é£¬°üÂÞSQL×¢Èë¡¢FortiOS CVE-2018-13379©¶´ÒÔ¼°ÖÖÖÖ1 day©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/iranian-hacking-group-targets-israel-with-wiper-disguised-as-ransomware/
3.GoogleÐû²¼Äþ¾²¸üУ¬×ܼÆÐÞ¸´ChromeÖеÄ32¸ö©¶´
GoogleÓÚ±¾ÖܶþÐû²¼Chrome£¬×ܼÆÐÞ¸´32¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄ©¶´ÊÇAutofillÖеĶѻº³åÇøÒç³ö©¶´£¬±»×·×ÙΪCVE-2021-30521¡£´ËÍ⣬»¹ÐÞ¸´ÁËWebAudio¡¢WebRTC¡¢TabStrip¡¢TabGroups¡¢WebUIºÍWebAuthenticationÖеÄÊͷźóʹÓé¶´£¨CVE-2021-30522¡¢CVE-2021-30523¡¢CVE-2021-30524¡¢CVE-2021-30525¡¢CVE-2021-30527ºÍCVE-2021-30528£©£¬ÒÔ¼°TabStripÖеÄÔ½½çд£¨CVE-2021-30526£©µÈ©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/google-patches-32-vulnerabilities-release-chrome-91
4.¹úÍÁÄþ¾²²¿½«Ðû²¼ÃÀ¹úµÚÒ»¸öÓйعܵÀÍøÂçÄþ¾²µÄ¹æÔò
¹úÍÁÄþ¾²²¿£¨DHS£©½«Ðû²¼ÃÀ¹úµÚÒ»¸öÓйعܵÀÍøÂçÄþ¾²µÄ¹æÔò¡£DHS³ÆÆäÔËÊäÄþ¾²¹ÜÀí¾Ö½«ÔÚ±¾ÖÜÐû²¼Äþ¾²Ö¸ÁҪÇó¹ÜµÀ¹«Ë¾ÏòÁª°îÕþ¸®³ÂËßÍøÂçʼþ£¬²¢½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÖÜÄھ͹ܵÀ¹«Ë¾±£»¤ÆäϵͳµÄÒªÁìÒÔ¼°Ôâµ½¹¥»÷ʱӦ½ÓÄɵIJ½Öè£¬ÖÆ¶¨Ò»Ì׸üΪÍêÉÆµÄÇ¿ÖÆÐÔ¹æÔò¡£ÕâÐ©Ç¿ÖÆÐÔ¹æÔò½«È¡´úDHSÏÈǰÐû²¼µÄ×ÔÔ¸ÐÔÍøÂçÄþ¾²Ö¸ÄÏ¡£²»¾ÃǰColonial PipelineÔâµ½ÀÕË÷Èí¼þ¹¥»÷ʹ¹ÜµÀ¹Ø±ÕÁË11Ì죬Õâµ¼ÖÂÃÀ¹ú¶«Äϲ¿µÄÆûÓͶÌȱÒÔ¼°¹«ÃñµÄ¿Ö»ÅÐÔ¹ºÖ㬸ù«Ë¾ÓÚÉÏÖÜÖ§¸¶ÁË440ÍòÃÀÔªµÄÊê½ð¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/us-to-regulate-pipeline/
5.Mandiant·¢ÏÖÕë¶Ô²Ù×÷¼¼Êõ£¨OT£©µÄ¹¥»÷ƵÂÊÖð½¥Ôö¸ß
FireEyeµÄMandiant·¢ÏÖÕë¶Ô²Ù×÷¼¼Êõ£¨OT£©µÄ¹¥»÷ƵÂÊÖð½¥Ôö¸ß¡£MandiantÌåÏÖÆä´Ó2012ÄêÆð¾Í¿ªÊ¼¼à¿ØÄÇЩÉù³Æ³öÊÛOTϵͳ·ÃÎÊȨµÄ¹¥»÷Õߣ¬²¢·¢ÏÖÔÚ¹ýÈ¥¼¸ÄêÀ´ËÀàʼþµÄƵÂʺÍÑÏÖØË®Æ½ÓÐ×ÅÏÔÖøÔö¼Ó¡£×î½ü£¬Ñо¿ÈËÔ±ÓÖ·¢ÏÖÁ˸ü¶àµÄ·ÇÅÓ´óÐÔ¹¥»÷»î¶¯£¬ËüÃÇÀûÓó£¼ûµÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½(TTPs)ºÍÉÌÆ·¹¤¾ßÀ´·ÃÎÊ»òÊÕ¼¯ÐÅÏ¢£¬ÕâÔÚ¹ýÈ¥ÊǺÜÉÙ¼ûµÄ¡£Mandiant½¨ÒéÓ¦¾³£¶ÔÍøÂç½øÐÐÇ¿»¯£¬ÒÔ·ÀֹDZÔÚµÄÍþв¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/not-as-complex-as-we-thought-cyberattacks-on-operational-technology-are-on-the-rise/
6.FlashpointÐû²¼ÓйضíÂÞ˹°µÍøHydraµÄ·ÖÎö³ÂËß
FlashpointÐû²¼ÁËÓйضíÂÞ˹°µÍøHydraµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬HydraµÄ»î¶¯×Ô½¨Á¢ÒÔÀ´Ñ¸ËÙÔö³¤£¬Äê½»Ò×¶î´Ó2016ÄêµÄ940ÍòÃÀÔªÔö³¤µ½2020Äêµ×µÄ13.7ÒÚÃÀÔª£¬HydraÔÚ2018-2020ÄêµÄÈýÄêÖУ¬ÄêÔö³¤Âʸߴï624%¡£´ËÍ⣬Hydra¹ÜÀíÔ±¶ÔÆäÂô¼ÒʵʩÁËÑϸñµÄ¿ØÖÆ£ºÊ×ÏÈ£¬½ûÖ¹Âô·½ÔÚHydraÉϽøÐÐÌá¿î£¬³ý·ÇÆäµ½´ï×îµÍÏ޶Æä´Î£¬Âô¼ÒÔÚÌá¿îʱ±ØÐëÊ×ÏȽ«HydraÉϵÄÊÕÒæ×ª»»Îª¶íÂÞ˹µÄ·¨¶¨»õ±Ò¡£
ÔÎÄÁ´½Ó£º
https://www.flashpoint-intel.com/blog/chainalysis-hydra-cryptocurrency-research/