ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£8ÔÂ12ÈÕ£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£Í¬ÈÕ£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬Äþ¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþ·þÎñÆ÷ÔÚ¹ýÈ¥¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£ProxyShellÊÇ3¸ö©¶´CVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£Ñо¿ÈËÔ±ÌåÏÖ£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËʵ¼Ê¹¥»÷¡£´ËÍ⣬Òѱ»ÈëÇÖµÄ1900¶ą̀Exchange·þÎñÆ÷Éæ¼°µ½µÄ×éÖ¯°üÂÞ½¨ÖþÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



Ñо¿ÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


Ñо¿ÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑǾÓÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£Ôڴ˴λÖй¥»÷ÕßÌáÐÑÄ¿±êÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍ¼ì²ì¡£Ò»µ©Óû§µã»÷Á´½Ó£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔAndroidÓû§£¬¾ßÓÐÇÔȡ֧¸¶¿¨ÏêϸÐÅÏ¢¡¢À¹½Ø¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÊÕ¼¯ÊÖ»úÉÏµÄÆäËûÐÅÏ¢·ÃÎÊȨÏ޵ȹ¦Ð§¡£FlubotÔçÔÚ½ñÄêÄê³õ¾Í¹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¼Ò£¬²¢ÔÚ±¾Ô¿ªÊ¼Õë¶Ô°Ä´óÀûÑÇÓû§¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬¹ú·À²¿ÍøÂç˾ÁÕýÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£Â·Í¸ÉçҲ֤ʵÁËÕâһʼþ£¬µ«ËüÔö²¹ËµÕâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£Ä¿Ç°Éв»Çå³þ´Ë´Î¹¥»÷ÊǺÎʱ±»·¢ÏÖ£¬µ«Ñо¿ÈËÔ±ÈÏΪ£¬¹¥»÷¿ÉÄÜ·¢ÉúÔÚ¼¸ÖÜǰ¡£¹úÎñÔº·¢ÑÔÈËÌåÏÖ£¬ËûÃÇÕýÔÚ½ÓÄÉ´ëÊ©ÒÔÈ·±£ÐÅÏ¢¿ÉÒÔÊܵ½±£»¤£¬¶øÇÒ³öÓÚÄþ¾²Ô­ÒòÎÞ·¨ÌÖÂÛ¸ÃʼþµÄÐÔÖʺͷ¶Î§¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨.png


CISAÐû²¼ÁËÓйؽüÆÚÓëÖØ´ó×ÔÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨¡£¸Ã¾¯±¨Ö¸³ö£¬ÔÚÖØ´ó×ÔÈ»ÔÖº¦Ö®ºó£¬°üÂÞ¶ñÒâÁ´½Ó»ò¸½¼þÆÛÕ©ÐÔµç×ÓÓʼþͨ³£»áºÜ³£¼û¡£×éÖ¯ºÍ¸öÈËÔÚ´¦ÖôøÓÐÓëì«·çÏà¹ØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱÐèҪСÐĽ÷É÷¡£´ËÍ⣬»¹Òª¾¯ÌèÓë¶ñÁÓÌìÆøÊ¼þÏà¹ØµÄÉ罻ýÌåÇëÇó¡¢Îı¾»òÏßÏ»¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco TalosÐû²¼2021ÄêQ2ʼþÏìÓ¦µÄÍþв³ÂËß


Cisco TalosÐû²¼2021ÄêQ2ʼþÏìÓ¦µÄÍþв³ÂËß.jpg


Cisco TalosÐû²¼ÁË2021ÄêQ2ʼþÏìÓ¦µÄÍþв³ÂËß¡£³ÂËßÖ¸³ö£¬ÉÏÒ»¼¾¶È£¬ÀÕË÷Èí¼þÊ״β»ÔÙÕ¼¾ÝÖ÷ҪλÖã¬ÍƲâÕâ¿ÉÄÜÊÇÓÉMicrosoft Exchange ©¶´ÀûÓûµÄ´ó·ùÔö¼Óµ¼ÖµÄ¡£Ö®ºó£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬Õ¼ËùÓÐʼþµÄ½üÒ»°ë£¨46%£©£¬ÓÖ³ÉΪ×î´óµÄÍþв¡£ÆäÖУ¬Ö÷ÒªµÄÀÕË÷Èí¼þ°üÂÞREvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£´ËÍ⣬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬±¾¼¾¶ÈµÄÄþ¾²¼ì²âÈÆ¹ý¼¼ÊõµÄʹÓÃÓÐËùÔö¼Ó¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html