Sucuri·¢ÏÖ´ó¹æÄ£µÄSEO»î¶¯ÒÑÈëÇÖ½ü15000¸öÍøÕ¾

Ðû²¼Ê±¼ä 2022-11-11
1¡¢Sucuri·¢ÏÖ´ó¹æÄ£µÄSEO»î¶¯ÒÑÈëÇÖ½ü15000¸öÍøÕ¾

¾Ý11ÔÂ9ÈÕ±¨µÀ£¬Sucuri·¢ÏÖÒ»Æð´ó¹æÄ£µÄËÑË÷ÒýÇæÓÅ»¯(SEO)»î¶¯£¬ÈëÇÖÁ˽ü15000¸öÍøÕ¾£¬½«·ÃÎÊÕßÖØ¶¨Ïòµ½Î±ÔìµÄÎÊ´ðÌÖÂÛÂÛ̳¡£Ã¿¸ö±»¹¥»÷µÄÍøÕ¾¶¼°üÂÞԼĪ20000¸öÎļþ£¬×÷ΪËÑË÷ÒýÇæÀ¬»øÓʼþ»î¶¯µÄÒ»²¿ÃÅ£¬ÆäÖдó¶àÊýÍøÕ¾ÊÇWordPress¡£¹¥»÷Õß»áÐÞ¸ÄWordPressµÄPHPÎļþ£¬Èç'wp-singup.php'ºÍ'wp-cron.php'£¬À´×¢ÈëÖØ¶¨Ïò¡£ÓÐʱ¹¥»÷Õß»áÔÚÄ¿±êÍøÕ¾ÉÏ·Ö·¢ËûÃÇ×Ô¼ºµÄPHPÎļþ£¬²¢Ê¹ÓÃÁËËæ»ú»òαºÏ·¨µÄÎļþÃû£¬Èç'wp-logln.php'¡£

https://www.bleepingcomputer.com/news/security/15-000-sites-hacked-for-massive-google-seo-poisoning-campaign/

2¡¢Mandian¼ì²âµ½APT29Õë¶ÔÅ·ÖÞÍâ½»×éÖ¯µÄ¹¥»÷»î¶¯

MandianÔÚ11ÔÂ8Èճƣ¬APT29ÀֳɵصöÓã¹¥»÷ÁËÒ»¸öÅ·ÖÞµÄÍ⽻ʵÌ壬²¢×îÖÕÀûÓÃÁËWindowsƾ֤ÂþÓΣ¨Credential Roaming£©¹¦Ð§¡£Ñо¿ÈËÔ±ÔÚ2022Äê³õAPT29ѬȾĿ±êʱ£¬ÊӲ쵽Õë¶ÔActive DirectoryϵͳִÐеĴóÁ¿¾ßÓзǵäÐÍÊôÐÔµÄLDAP²éѯ¡£½øÒ»²½¼ì²é·¢ÏÖ£¬´ËÊôÐÔÊÇActive Directoryƾ¾ÝÂþÓι¦Ð§µÄÒ»²¿ÃÅ¡£Ñо¿ÈËÔ±»¹Ç¿µ÷ÁËÒ»¸öÈÎÒâÎļþдÈëµ¼ÖµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-30170£©£¬¿É±»¹¥»÷ÕßÎäÆ÷»¯À´Ö´Ðй¥»÷¡£

https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming

3¡¢IceXLoaderÉù³ÆÒÑѬȾȫÇòÊýǧ̨¸öÈ˺Í×éÖ¯µÄPC

11ÔÂ8ÈÕ±¨µÀ³Æ£¬Ð°汾µÄIceXLoader¿ÉÄÜÒÑѬȾÁËÈ«ÇòÊýǧ̨É豸¡£IceXLoaderÓÚ½ñÄê6ÔÂÊ״α»Fortinet·¢ÏÖ£¬ÊÇÒ»ÖÖÉÌÒµ¶ñÒâÈí¼þ¡£Æäʱ·¢Ïֵİ汾£¨v3.0£©ºÃÏñÈÔÔÚ¿ª·¢ÖУ¬Ñо¿ÈËÔ±½üÆÚ·¢ÏÖÁËÒ»¸ö¹¦Ð§ÆëÈ«ÇÒ°üÂÞ¶à½×¶Î·Ö·¢Á´µÄ°æ±¾£¨v3.3.3£©¡£Ñ¬È¾Ê¼ÓÚͨ¹ýµöÓãÓʼþ·¢Ë͵ÄZIPÎļþ£¬Ëü»á·Ö·¢ÏÂÒ»½×¶ÎµÄ¿ÉÖ´ÐÐÎļþSTOREM~2.exe£¬×îÖÕIceXLoader»áʹÓýø³Ì¿ÕÐÄ×¢Èëµ½STREM~2.exeÖС£Ñо¿ÈËÔ±ÒÑÏòÊÜÓ°ÏìµÄ¹«Ë¾Í¨±¨ÁË´Ë´Îʼþ£¬µ«¸Ã¶ñÒâÈí¼þµÄ±»¹¥»÷Ä¿±êµÄÊý¾Ý¿âÈÔÔÚ²»Í£¸üС£

https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world/

4¡¢Å·ÖÞÐ̾¯×éÖ¯´þ²¶ÉæÏÓ¼ÓÈëLockBitÀÕË÷¹¥»÷µÄÏÓÒÉÈË

Å·ÖÞÐ̾¯×éÖ¯11ÔÂ10ÈÕÐû²¼´þ²¶ÁËÒ»ÃûÓëLockBitÀÕË÷¹¥»÷ÓйصÄÏÓÒÉÈË¡£ÕâÃû33ËêµÄÏÓÒÉÈËÃû½ÐMikhail Vasiliev£¬ÓµÓжíÂÞ˹ºÍ¼ÓÄôóË«¹ú¼®£¬ÓÚ10ÔÂ26ÈÕÔÚ¼ÓÄô󰲴óÂÔÊ¡±»²¶¡£Ö´·¨ÈËÔ±´ÓÆä¼ÒÖвé»ñÁË8̨µçÄÔºÍ32¸öÍâÖÃÓ²ÅÌ¡¢Á½°ÑǹºÍ¼ÛÖµ40ÍòÅ·ÔªµÄ¼ÓÃÜ»õ±Ò¡£ËäȻŷÖÞÐ̾¯×éÖ¯½«ÆäÃèÊöΪLockBitµÄÔËÓªÈËÔ±£¬µ«ËûºÜ¿ÉÄÜÊÇ×÷Ϊ¸Ã»î¶¯µÄÁ¥Êô»ú¹¹¶ø·Ç¹ÜÀíÕß¡£ËûÏÖÔÚÕýÔÚÆÚ´ýÒòÉæÏÓ¼ÓÈëLockBitÀÕË÷¹¥»÷¶ø±»Òý¶Éµ½ÃÀ¹ú¡£

https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/

5¡¢Trend MicroÐû²¼¹ØÓÚEarth LongzhiÍÅ»ïµÄ·ÖÎö³ÂËß

Trend MicroÔÚ11ÔÂ9ÈÕÐû²¼Á˹ØÓÚEarth LongzhiÍÅ»ïµÄ·ÖÎö³ÂËß¡£¸ÃÍÅ»ï´Ó2020Äê¾Í¿ªÊ¼»îÔ¾£¬ÀûÓö¨Öư汾µÄCobalt Strike¼ÓÔØ·¨Ê½ÔÚÄ¿±êÖÐÖ²ÈëºóÃÅ¡£Ëü»¹ÓëEarth BakuÓÐÏàËÆµÄTTP£¬Á½Õß¶¼±»ÈÏΪÊÇAPT41×Ó×éÖ¯¡£¸Ã×éÖ¯µÚÒ»´Î»î¶¯·¢ÉúÔÚ2020Äê5ÔÂÖÁ2021Äê2Ô£¬ÀûÓÃSymatic¹¥»÷Öйų́ÍåµÄÕþ¸®¡¢Ò½ÁƱ£½¡ºÍѧÊõµÈÐÐÒµ¡£µÚ¶þ´Î»î¶¯´Ó2021Äê8ÔÂÁ¬Ðøµ½2022Äê6Ô£¬ÀûÓÃCroxLoader¡¢BigpipeLoaderºÍOutLoaderµÈ¹¤¾ß£¬Õë¶ÔÌ©¹ú¡¢ÂíÀ´Î÷ÑǺÍÓ¡¶ÈÄáÎ÷Ñǵȹú¼ÒµÄ×éÖ¯¡£

https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html

6¡¢Check PointÐû²¼PyPIÉ϶ñÒâ°ü»ìÏý·½Ê½µÄ·ÖÎö³ÂËß

11ÔÂ9ÈÕ£¬Check Point͸¶Æä¼ì²âµ½Ò»¸öеĶñÒⷨʽ°ü£¬Ö¼ÔÚÒþ²ØÍ¼ÏñÖеĴúÂ벢ͨ¹ýGithubÉϵĿªÔ´ÏîĿѬȾPyPIÓû§¡£¸Ã¶ñÒâ°üÃûΪapicolor£¬¿´ËÆÊǸöÆÕͨµÄ°ü£¬µ«Ëü»áÏÈÊÖ¶¯°²×°Á½¸ö°ürequestsºÍjudyb¡£judyb´úÂëÊÇÒ»¸öÒþдÄ£¿é£¬ÂôÁ¦Òþ²ØºÍÏÔʾͼƬÖеÄÒþ²ØÐÅÏ¢¡£Óû§ÔÚËÑË÷²¢°²×°ÕâЩ¿ªÔ´ÏîĿʱ£¬²¢²»ÖªµÀÆäÖÐÒþ²Ø×ŶñÒâ´úÂ롣Ŀǰ£¬PyPIÔÚÊÕµ½Check PointµÄ³ÂËߺóɾ³ýÁËapicolor°ü¡£

https://research.checkpoint.com/2022/check-point-cloudguard-spectral-exposes-new-obfuscation-techniques-for-malicious-packages-on-pypi/