Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
Ðû²¼Ê±¼ä 2022-03-02Òò¹©Ó¦ÉÌÔâµ½¹¥»÷£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ¿ªÊ¼£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£´Ë´ÎÖжÏÊÇÓÉÓÚÆäÖØÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¾ÝÔ¤¼Æ£¬´Ë´Îʼþ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5%£¬Ô¼ºÏ13000Á¾Æû³µ¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄ¾ßÌåÓ°Ï졣Ŀǰ£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖжϻáÁ¬Ðø¶à¾Ã¡£
https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/
°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓзþÎñÖжÏ
¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂ磬²¢¹Ø±ÕËùÓзþÎñ¡£Ä¿Ç°£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨·ÃÎÊ£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½£¬Õâ¶ÔÁгµµÄÔËÓª·¢ÉúÁ˼«´óµÄÓ°Ïì¡£¼¸ÈÕǰ£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£
https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html
Ñо¿ÍŶӷ¢ÏÖÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£µöÓãµÄ¹¥»÷»î¶¯
¾Ý2ÔÂ24Èյı¨µÀ£¬Bitdefender·¢ÏÖÁ˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£µöÓãµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ£¬ÒÔÕË»§¶³½áΪÓÕ¶ü£¬ÓÕʹĿ±êµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄµöÓãÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂ룬ּÔÚÇÔȡĿ±êÒøÐÐÕË»§ÖеÄÓà¶î¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý£¬´ó²¿ÃŵöÓãÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£©£¬Æä´ÎΪӢ¹ú£¨7%£©£»´ó²¿ÃÅÓʼþÀ´×ÔÃÀ¹úµÄIPµØÖ·£¨40%£©£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£
https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/
Ñо¿ÈËÔ±¹ûÈ»ÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÁÄÌì¼Ç¼
2ÔÂ27ÈÕ±¨µÀ³Æ£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõÁÄÌì¼Ç¼¹ûÈ»¡£¾ÝϤ£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿ÈËԱй¶µÄ£¬Ëû¿ÉÒÔ·ÃÎÊContiµÄXMPPÁÄÌì·þÎñÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë£¬×ܹ²ÓÐ393¸öJSONÎļþ£¬°üÂÞ2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÏûÏ¢¡£ÕâЩ¼ÇÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖֻµÄÐÅÏ¢£¬°üÂÞÒÔǰδ¹ûÈ»µÄ±»¹¥»÷Ä¿±ê¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØÖ·ÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£
https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/
CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄ¼¼Êõ·ÖÎö³ÂËß
2ÔÂ24ÈÕ£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄ¼¼Êõ·ÖÎö³ÂËß¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð£¬ÒѸüÐÂÁËÆß´Î¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ£¬Í¨¹ýÍøÂçµöÓãµç×ÓÓʼþ½øÈëÄ¿±êϵͳ¡£Æä½áºÏÁËÇÔÈ¡·¨Ê½¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨÐÅ£¬Ö§³ÖTorÍøÂ磬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£
https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/
Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄ·ÖÎö³ÂËß
¾Ý2ÔÂ27ÈÕ±¨µÀ£¬Intel 471Åû¶Á˰´°²×°¸¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨÐÅÀ´¼ìË÷¶ñÒâpayloadµÄURL£¬²¢°²×°ÔÚÄ¿±êÖ÷»úÉÏ£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£Í¨³£ÒÀ¿¿¾¹ýSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾½øÐзַ¢£¬¿É°²×°²¢Ö´ÐжàÖÖ¶ñÒâpayload£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£
https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/
Äþ¾²¹¤¾ß
DRAKVUF Sandbox
×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þ·ÖÎöϵͳ£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£
https://github.com/CERT-Polska/drakvuf-sandbox
StayKit
Cobalt Strike ³Ö¾ÃÐÔµÄÀ©Õ¹£¬ËüÀûÓà SharpStay .NET ·¨Ê½¼¯µÄ execute_assembly º¯Êý¡£
https://github.com/0xthirteen/StayKit
Fennec
Óà Rust ±àдµÄ¹¤¼þÊÕ¼¯¹¤¾ß£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄʼþÏìÓ¦ÆÚ¼äʹÓá£
https://github.com/AbdulRhmanAlfaifi/Fennec
request smuggler
Http ÇëÇó×ß˽©¶´É¨ÃèÆ÷£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽©¶´¹¥»÷µÄ·þÎñÆ÷¡£
https://github.com/Sh1Yo/request_smuggler
Shellcode Template
ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£
https://github.com/Cracked5pider/ShellcodeTemplate
Äþ¾²·ÖÎö
CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ý©¶´
https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/
ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â
https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/
ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã
https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/
΢ÈíÐû²¼ÔÚ Windows 11 ÖнøÐÐÐ嵀 Windows ¸üиïÐÂ
https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml