È«Çò×î´óÈâÀàÉú²úÉÌJBSÔâµ½¹¥»÷ £¬¶à¸ö·Ö¹«Ë¾Í£²ú£»Ñо¿ÍŶӷ¢ÏÖкóÃÅFacefish £¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢

Ðû²¼Ê±¼ä 2021-06-01

1.È«Çò×î´óÈâÀàÉú²úÉÌJBSÔâµ½¹¥»÷ £¬¶à¸ö·Ö¹«Ë¾Í£²ú


1.jpg


JBSʳƷ¹«Ë¾ÓÚÉÏÖÜÄ©Ôâµ½¹¥»÷ £¬Ó°ÏìÃÀ¹ú¡¢°Ä´óÀûÑǺͼÓÄôóµÈµØµÄ·Ö¹«Ë¾¡£JBSÊÇÈ«Çò×î´óµÄÅ£ÈâºÍ¼ÒÇÝÉú²úÉÌ £¬Ò²ÊÇÈ«ÇòµÚ¶þ´óÖíÈâÉú²úÉÌ £¬ÔÚÁù´óÖÞµÄ190¸ö¹ú¼Ò/µØÓò¶¼ÓÐÒµÎñ¡£Ä¿Ç° £¬°Ä´óÀûÑÇÕþ¸®ÒÑ»ñϤÕâһʼþ £¬²¢ÕýÔÚÓëJBSºÏ×÷ÊÔͼ»Ö¸´¾³ÄÚµÄÉú²ú»î¶¯¡£ÏÖÔÚÉв»Çå³þ´Ë´Î¹¥»÷µÄÐÔÖʵȾßÌåÐÅÏ¢ £¬ÓÉÓÚ¹¥»÷·¢ÉúÓÚÖÜÄ© £¬Òò´ËÑо¿ÈËÔ±ÍÆ¶Ï¼«ÓпÉÄÜÓëÀÕË÷Èí¼þÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/food-giant-jbs-foods-shuts-down-production-after-cyberattack/


2.°Ä´óÀûÑÇBLK Sport³ÆÆäÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷


2.jpg


°Ä´óÀûÑÇBLK SportÐû²¼ÉùÃ÷ £¬³ÆÆäÄÚ²¿·þÎñÆ÷ÓÚ2021Äê4ÔÂ21ÈÕÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷ £¬¿Í»§ÐÅÏ¢ÒѾ­Ð¹Â¶¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞ¿Í»§ÐÅÏ¢ £¬ÈçÃû³Æ¡¢µØÖ·¡¢ÁªÏµ·½Ê½¡¢ºÏͬÐÅÏ¢ºÍ¶©µ¥ÐÅÏ¢µÈ£»ÒÔ¼°¹©Ó¦ÉÌÐÅÏ¢ £¬È繫˾ºÍ·þÎñÈËÔ±Ãû³Æ¡¢µØÖ·¡¢ÁªÏµ·½Ê½¡¢ºÏͬÐÅÏ¢¡¢¶©µ¥ÐÅÏ¢ºÍÒøÐÐÕÊ»§ÐÅÏ¢µÈ¡£¸Ã¹«Ë¾Ç¿µ÷Óû§µÄÕ˺źÍÃÜÂë £¬ÒÔ¼°ÐÅÓÿ¨ºÅµÈ²ÆÕþÐÅÏ¢²¢Î´Ð¹Â¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/au-blk-sport-reveals-darkside-attack/


3.Ñо¿ÍŶӷ¢ÏÖкóÃÅFacefish £¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢


3.jpg


Ñо¿ÍŶӷ¢ÏÖÁËÒ»¸öеĺóÃÅFacefish £¬¿É¿ØÖÆLinuxϵͳ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£FacefishÓÉDropperºÍRootkitÁ½²¿ÃÅ×é³É £¬ÆäÖ÷Òª¹¦Ð§ÓÉRootkitÄ£¿éÈ·¶¨ £¬¸ÃÄ£¿éÔÚRing3²ãÊÂÇé £¬²¢Ê¹ÓÃLD_PRELOAD¹¦Ð§½øÐмÓÔØ¡£¸Ã¶ñÒâÈí¼þÖ§³Ö¶àÖÖ¹¦Ð§ £¬°üÂÞ:ÉÏ´«É豸ÐÅÏ¢¡¢ÇÔÈ¡Óû§Æ¾Ö¤¡¢µ¯»ØshellºÍÖ´ÐÐÈÎÒâÃüÁî¡£´ËÍâ £¬Ñо¿ÈËÔ±ÌåÏÖFacefish½ÓÄÉÁËÅÓ´óµÄͨÐÅЭÒéºÍ¼ÓÃÜËã·¨ £¬ËüʹÓÃÒÔ0x2XX¿ªÍ·µÄÖ¸ÁîÀ´½»»»¹«Ô¿ £¬²¢Ê¹ÓÃBlowFishÓëC2·þÎñÆ÷¼ÓÃÜͨÐÅÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118388/malware/facefish-backdoor.html


4.Ñо¿ÍŶӷ¢ÏÖ¶à¸ö¿ÉѬȾPulse Secure VPNµÄ¶ñÒâÈí¼þ


4.jpg


FireeyeÑо¿ÍŶӷ¢ÏÖÁ˶à¸ö¿ÉѬȾPulse Secure VPNÉ豸µÄ¶ñÒâÈí¼þ¼Ò×å¡£ÕâЩ¶ñÒâÈí¼þÀûÓõÄ©¶´Ö÷ÒªÊÇÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2021-22893£© £¬CVSSÆÀ·ÖΪ10 £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÖ´ÐÐÈÎÒâ´úÂë¡£½ØÖÁĿǰ £¬ÒÑ·¢ÏÖÁË16¸ö´ËÀà¶ñÒâÈí¼þ £¬°üÂÞÓÃÓÚ½âÎöPSCÈÕÖ¾ÎļþµÄBloodmine¡¢ÇÔȡƾ¾ÝµÄBloodbank¡¢ÄÚ´æ²¹¶¡¹¤¾ßCleanpulseºÍWeb shell RapidpulseµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-find-four-new-malware-tools-created-to-exploit-pulse-secure-vpn-appliances/


5.ImpervaÐû²¼ÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄ·ÖÎö³ÂËß


5.jpg


ImpervaÐû²¼ÁËÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄ·ÖÎö³ÂËß £¬Éæ¼°17¸ö¹ú¼ÒµÄ19¸öÐÐÒµµÄ1200ÃûITÄþ¾²×¨ÒµÈËÔ±¡£³ÂËßÖ¸³ö £¬È¥Äê £¬86£¥µÄ×éÖ¯Ôâµ½ÁËÍøÂç¹¥»÷ £¬ÆäÖÐ69£¥µÄ×éÖ¯Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬¶ø57£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£»´«Í³ÐÐÒµµÄITÄþ¾²Ô¤ËãÔö¼ÓÁË4£¥ £¬87£¥µÄ×éÖ¯Óöµ½ÁËITÄþ¾²ÈËÔ±¶ÌȱµÄÎÊÌ⣻ËÄ·ÖÖ®ÈýµÄ×éÖ¯½«ÔÚÃ÷ÄêʵʩSD-WAN¡¢ÁãÐÅÈÎÍøÂç·ÃÎÊ£¨ZTNA£©ºÍÄþ¾²·ÃÎÊ·þÎñ±ßÔµ£¨SASE£©¼¼Êõ¡£


Ô­ÎÄÁ´½Ó£º

https://www.imperva.com/resources/resource-library/reports/2021-cyberthreat-defense-report/


6.PerimeterxÐû²¼2020ÄêµçÉÌÆÛÕ©»î¶¯µÄ·ÖÎö³ÂËß


6.jpg


PerimeterxÐû²¼ÁË2020ÄêµçÉÌÆÛÕ©»î¶¯µÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö £¬Õë¶Ôµç×ÓÉÌÎñÁãÊÛÉÌµÄÆÛÕ©¹¥»÷ÔÚÊýÁ¿¡¢ÆµÂʺÍÅÓ´óˮƽÉ϶¼ÓÐËùÔö¼Ó¡£2020Äê4Ô £¬ÌÂÈû¿îƽ̨µÄ¹¥»÷Ôö¼ÓÁË69%£»ÔÚÏÞÁ¿°æÔ˶¯Ð¬ÏúÊÛá¯ÁëÆÚ¼ä £¬»ÆÅ£botÌᳫÁËÁè¼Ý40%µÄ¹ºÎïÇëÇó£»ÔÚ9ÔÂ·Ý £¬85%µÄµÇ¼ÊÇATOʵÑé £¬¶ø×èÈûÁ÷Á¿µÄ·åֵˮƽÔÚËĸöÔÂÄÚÁè¼ÝÁË95£¥£»2020Äê £¬ÃÀ¹úÿ¸öÖ÷ÒªµÄ¼ÙÆÚ¶¼·¢ÉúÀñÆ·¿¨ÆÛթʼþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.perimeterx.com/resources/reports/automated-fraud-benchmark-report-e-commerce-edition/