Ñо¿ÍŶӳƽüÆÚÀÕË÷Èí¼þ¹¥»÷Á¬Ðø¼¤Ôö£¬Í¬±ÈÔö³¤93%£»Ñо¿ÈËÔ±Åû¶¸Ä¶¯¿ÉÖ´ÐоµÏñµÄ¹¥»÷Process Ghosting

Ðû²¼Ê±¼ä 2021-06-22

1.Ñо¿ÍŶӳƽüÆÚÀÕË÷Èí¼þ¹¥»÷Á¬Ðø¼¤Ôö£¬Í¬±ÈÔö³¤93%


1.jpg


Check Point ResearchÑо¿ÍŶӳƽüÆÚÀÕË÷Èí¼þ¹¥»÷Á¬Ðø¼¤Ôö ¡£2021Äê6ÔÂÿÖÜÊÜÀÕË÷Èí¼þÓ°ÏìµÄ×éÖ¯ÊýÁ¿ÒÑÔöÖÁ1210¸ö£¬×ÔÄê³õÒÔÀ´£¬ÀÕË÷Èí¼þ¹¥»÷´ÎÊýÔö¼ÓÁË41%£¬Í¬±ÈÔö¼ÓÁË93% ¡£ÆäÖÐÀ­¶¡ÃÀÖÞµÄÀÕË÷Èí¼þ¹¥»÷ʵÑéÔö³¤×îΪÏÔ×Å£¬Ôö³¤ÁË62%£¬Æä´ÎÊÇÅ·ÖÞÔö¼ÓÁË59%£¬·ÇÖÞÔö¼ÓÁË34%£¬±±ÃÀÔö¼ÓÁË32% ¡£´ËÍ⣬Õë¶Ô½ÌÓýÐÐÒµµÄ¹¥»÷Ôö³¤ËÙ¶È×î¿ì£¨ÓëÈ¥ÄêͬÆÚÏà±ÈÔö³¤ÁË347%£©£¬Æä´ÎΪÔËÊäÐÐÒµ£¨186%£©¡¢ÁãÊÛºÍÅú¿¯ÐÐÒµ£¨162%£©ÒÔ¼°Ò½ÁƱ£½¡ÐÐÒµ£¨159%£© ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/06/14/ransomware-attacks-continue-to-surge-hitting-a-93-increase-year-over-year/


2.ŲÍþ¾¯·½È·ÈÏÆäÔÚ2018ÄêÔâµ½µÄºÚ¿Í¹¥»÷ÓëAPT31ÓйØ


2.jpg


ŲÍþ¾¯²ìÄþ¾²¾Ö (PST) ÌåÏÖ£¬ÆäÔÚ2018ÄêÔâµ½µÄÍøÂç¹¥»÷ÓëºÚ¿Í×éÖ¯APT31ÓÐ¹Ø ¡£¾ÝÊÓ²ìÏÔʾ£¬Ôڴ˴ι¥»÷ÖкڿÍÒÑÀֳɻñµÃ¹ÜÀíԱȨÏÞ£¬¿ÉÒÔ·ÃÎʸùúËùÓйú¼ÒÐÐÕþ°ì¹«ÊÒʹÓõÄÖÐÑë¼ÆËã»úϵͳ£¬»¹ÀֳɵشӰ칫ÊÒϵͳÇÔÈ¡ÁËһЩÊý¾Ý ¡£´ËÍ⣬Ñо¿ÈËÔ±³Æ£¬APT31»¹±»ÈÏΪÊÇ2020Äê12ÔÂÕë¶Ô·ÒÀ¼Òé»áµÄÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖ£¬Ôڴ˴ι¥»÷ÖкڿÍÀÖ³ÉÈëÇÖÁËһЩÒé»áÏà¹Øµç×ÓÓʼþµÄÕÊ»§ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/119161/apt/norway-blames-china-apt31.html


3.ÈÕ±¾Sports Club NASºÍIto Yogyo³ÆÔâµ½ÀÕË÷¹¥»÷


3.jpg


½üÆÚ£¬Á½¼ÒÈÕ±¾¹«Ë¾Sports Club NASºÍIto Yogyo¾ùÉù³ÆÔâµ½ÀÕË÷¹¥»÷ ¡£ÆäÖУ¬½¡Éí¾ãÀÖ²¿NASÌåÏÖ¹¥»÷·¢ÉúÔÚ4ÔÂ2ÈÕ£¬Ð¹Â¶ÁËÔ¼15Íò»áÔ±ºÍÔ±¹¤µÄ¸öÈËÐÅÏ¢£¬°üÂÞÐÕÃû¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵绰ºÅÂë¡¢»áÔ±ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢½ô¼±ÁªÏµ·½Ê½¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍÕË»§ÐÅÏ¢µÈ ¡£»ìÄýÍÁÖÆÔìÉÌIto YogyoÌåÏÖ¹¥»÷·¢ÉúÔÚ6ÔÂ10ÈÕÁ賿£¬¸Ã¹«Ë¾ÔÚ·¢ÏÖ¹¥»÷ºóÁ¢¿Ì¹Ø±ÕÁË¿ÉÄÜÊܵ½Ó°ÏìµÄ·þÎñÆ÷ºÍµçÄÔ£¬Ä¿Ç°Ê¼þÈÔÔÚÊÓ²ìÖУ¬ÉÐδȷ¶¨ÊÇ·ñ´æÔÚÊý¾Ýй¶µÄÇé¿ö ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/jp-sports-club-nas-and-concrete-manufacturer-ito-yogyo-both-report-ransomware-incidents/


4.NVIDIAÄþ¾²¸üУ¬ÐÞ¸´ÆäJetsonоƬϵÁÐÖеÄ9¸ö©¶´


4.jpg


NVIDIAÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËNVIDIA Jetson AGX XavierϵÁС¢Jetson Xavier NX¡¢Jetson TX1¡¢Jetson TX2ϵÁкÍJetson NanoÖеÄ9¸ö©¶´ ¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄ©¶´ÊÇJetson¿ò¼ÜÖеĻº³åÇøÒç³ö©¶´£¨CVE?2021?34372£©£¬´æÔÚÓÚNVIDIA OTEЭÒéÏûÏ¢½âÎö´úÂëÖУ¬¿ÉÄܵ¼ÖÂÐÅϢй¶¡¢È¨ÏÞÌáÉýºÍ¾Ü¾ø·þÎñ(DoS) ¡£Æä´ÎΪNVIDIA TLKÖеĶÑÒç³ö©¶´£¨CVE?2021?34373£©ºÍ¶à¸ö¿É´¥·¢DoS¹¥»÷µÄ©¶´£¨CVE-2021-34379ºÍCVE-2021-34380£©µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/nvidia-jetson-chipset-dos-data-theft/167093/


5.Ñо¿ÈËÔ±Åû¶¸Ä¶¯¿ÉÖ´ÐоµÏñµÄ¹¥»÷Process Ghosting


5.jpg


Ñо¿ÈËÔ±Åû¶Á˸͝¿ÉÖ´ÐоµÏñµÄ¹¥»÷·½Ê½Process Ghosting£¬¿ÉÈÆ¹ýWindowsϵͳÉϵı£»¤´ëʩִÐжñÒâ´úÂë ¡£ElasticµÄÑо¿ÈËÔ±³Æ£¬Í¨¹ýÕâÖÖ·½Ê½£¬¹¥»÷Õß¿ÉÒÔÒÔÒ»ÖÖÄÑÒÔɨÃè»òɾ³ýµÄ·½Ê½½«¶ñÒâÈí¼þдÈë´ÅÅÌ£¬È»ºóÏñÖ´ÐÐÆÕͨÎļþÒ»ÑùÖ´ÐÐÒѱ»É¾³ýµÄ¶ñÒâÈí¼þ£¬ÕâÖÖ¼¼Êõ²»Éæ¼°´úÂë×¢Èë¡¢½ø³Ì¿Õ»¯»òÊÂÎñÐÔNTFS(TxF) ¡£´ËÍ⣬Process GhostingÀ©Õ¹ÁËÒÔǰËù¼Ç¼µÄÖÕ¶ËÈÆ¹ýÒªÁ죬´Ó¶ø¿ÉÒÔÈÆ¹ýɱ¶¾Èí¼þµÄ·ÀÓùºÍ¼ì²âÀ´Òþ±ÎµØÖ´ÐжñÒâ´úÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/06/researchers-uncover-process-ghosting.html


6.NuspireÐû²¼2021ÄêµÚÒ»¼¾¶ÈµÄÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß


6.jpg


NuspireÐû²¼ÁË2021ÄêµÚÒ»¼¾¶ÈµÄÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß ¡£¸Ã³ÂËß·ÖÎöÁËÆä900ÒÚÌõÈÕÖ¾£¬¸ÅÊöÁËеÄÍøÂç·¸×ï»î¶¯ºÍ¼ÆÄ±¡¢¼¼ÊõºÍ·¨Ê½ (TTP) ¡£³ÂËßÖ¸³ö£¬ÔÚ2021ÄêQ1£¬Õë¶ÔFortinetµÄSSL-VPNµÄ¹¥»÷Ôö¼ÓÁË1916%£¬Õë¶ÔPulse Connect Secure VPNµÄ¹¥»÷Ôö¼ÓÁË1527% ¡£ÓÉÓÚVPNºÍRDP©¶´ÏÔ×ÅÔö¼Ó£¬¶ñÒâÈí¼þ¡¢½©Ê¬ÍøÂçºÍ©¶´ÀûÓûÓë2020ÄêQ4Ïà±ÈÓÐËùϽµ ¡£´ËÍ⣬½©Ê¬ÍøÂçZeroAccessµÄ»î¶¯ÔÚÒ»¸öÐÇÆÚÄÚ¼¤ÔöÁË619460%£¬È»ºóÔÚ±¾¼¾¶ÈÄ©»ØÂä ¡£


Ô­ÎÄÁ´½Ó£º

https://www.nuspire.com/resources/q1-2021-threat-report