΢ÈíÐû²¼2Ô·ÝÄþ¾²¸üУ¬°üÂÞ3¸öÒѱ»ÀûÓõÄ©¶´
Ðû²¼Ê±¼ä 2023-02-15
2ÔÂ14ÈÕ£¬Î¢ÈíÐû²¼ÁË2023Äê2ÔµÄÄþ¾²¸üУ¬ÐÞ¸´°üÂÞ3¸ö±»ÀûÓÃ0 dayÔÚÄÚµÄ77¸ö©¶´¡£ÆäÖУ¬Òѱ»ÀûÓõÄ©¶´·Ö±ðΪWindowsͼÐÎ×é¼þÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-21823£©£¬¿ÉÓÃÀ´ÒÔSYSTEMȨÏÞÖ´ÐÐÃüÁMicrosoft PublisherÄþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2023-21715£©£¬ÌØÖÆÎĵµ¿ÉÀûÓÃÆäÈÆ¹ýOfficeºê¼ÆÄ±£»ÒÔ¼°WindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½ÌØÈ¨ÌáÉý©¶´£¨CVE-2023-23376£©£¬¿ÉÓÃÀ´»ñµÃSYSTEMȨÏÞ¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/
2¡¢Cloudflare¼ì²âµ½Õë¶ÔÆä¿Í»§µÄ´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå2ÔÂ14ÈÕ±¨µÀ£¬Cloudflare¼ì²âµ½ÊýÊ®´Î³¬´óÈÝÁ¿DDoS¹¥»÷¡£¸Ã¹«Ë¾ÌåÏÖ£¬´ó¶àÊý¹¥»÷µÄ·åÖµÔÚÿÃë50-70°ÙÍò¸öÇëÇó(rps)×óÓÒ£¬×î´ó·åÖµÁè¼Ý7100Íòrps£¬ÕâÊÇÆù½ñΪֹ×î´ó¹æÄ£µÄHTTP DDoS¹¥»÷¡£ÕâЩ¹¥»÷»ùÓÚHTTP/2£¬ÊÇʹÓÃÀ´×Ô¶à¸öÔÆÌṩÉ̵Ä30000¶à¸öIPµØÖ·Õë¶ÔÖÖÖÖÄ¿±êÌᳫµÄ£¬°üÂÞÓÎÏ·ÌṩÉÌ¡¢ÔƼÆËãÆ½Ì¨¡¢¼ÓÃÜ»õ±Ò¹«Ë¾ºÍÍйÜÌṩÉÌ¡£ÔÚ¹ýÈ¥µÄÒ»ÄêÀÑо¿ÈËÔ±¿´µ½Á˸ü¶àÀ´×ÔÓÚÔÆ¼ÆË㹩ӦÉ̵Ĺ¥»÷¡£
https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html
3¡¢Phylum·¢ÏÖ451¸öÖ¼ÔÚ½Ù³Ö¼ÓÃÜ»õ±Ò½»Ò׵ĶñÒâPyPI°ü
PhylumÔÚ2ÔÂ10ÈÕ³ÆÆä·¢ÏÖ451¸ö¶ñÒâPyPI°ü£¬Ö¼ÔÚͨ¹ý°²×°¶ñÒâÀ©Õ¹½Ù³Ö»ùÓÚä¯ÀÀÆ÷µÄ¼ÓÃÜ»õ±Ò½»Òס£ÕâÊÇ×î³õÓÚ2022Äê11Ô·¢ÏֵĻµÄÑÓÐø£¬ÆäʱֻÓÐ27¸ö¶ñÒâPyPi°ü¡£Ôڴ˴λÖб»Ä£·ÂµÄÁ÷ÐÐÈí¼þ°ü°üÂÞbitcoinlib¡¢ccxtºÍcryptocompareµÈ£¬Ã¿¸ö¶¼ÓÐ13µ½38¸ö°æ±¾£¬ÊÔͼÁýÕÖ¿ÉÄܵÄÖÖÖÖ´íÎóÀàÐÍ¡£ÎªÁËÈÆ¹ý¼ì²â£¬¹¥»÷ÕßʹÓÃËæ»úµÄ16λÖÐÎĺº×Ö×éºÏ×÷Ϊº¯ÊýºÍ±äÁ¿±êʶ·û¡£
https://blog.phylum.io/phylum-discovers-revived-crypto-wallet-address-replacement-attack
4¡¢Group-IB͸¶Æä½üÆÚÔâµ½À´×ÔTonto TeamÍÅ»ïµÄ¹¥»÷
Group-IBÓÚ2ÔÂ13ÈÕ͸¶£¬Æä¼ì²â²¢×èÖ¹ÁËÀ´×ÔAPTÍÅ»ïTonto TeamµÄ¹¥»÷¡£¹¥»÷·¢ÉúÔÚ2022Äê6Ô£¬ÕâÊǵڶþ´ÎÕë¶ÔGroup-IBµÄ¹¥»÷£¬µÚÒ»´Î·¢ÉúÔÚ2021Äê3Ô¡£¹¥»÷ʼÓÚÒ»·âµöÓãÓʼþ£¬·Ö·¢ÁËʹÓÃRoyal Road Weaponizer´´½¨µÄ¶ñÒâMicrosoft OfficeÎĵµ¡£ÔÚ¹¥»÷ÆÚ¼ä£¬¹¥»÷Õß»¹ÀûÓÃÁËBisonal.DoubleTºóÃÅ¡£´ËÍ⣬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öеÄÏÂÔØ·¨Ê½TontoTeam.Downloader£¨ÓÖÃûQuickMute£©£¬ËüÖ÷ÒªÂôÁ¦´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷ÏÂÒ»½×¶ÎµÄ¶ñÒâÈí¼þ¡£
https://www.group-ib.com/blog/tonto-team/
5¡¢CheckPointÐû²¼2023Äê1Ô·ÝÈ«ÇòÍþвָÊýµÄ³ÂËß
2ÔÂ13ÈÕ£¬Check PointÐû²¼2023Äê1Ô·ÝÈ«ÇòÍþвָÊýµÄ³ÂËß¡£QbotºÍLokibotÊÇÉϸöÔÂ×î³£¼ûµÄ¶ñÒâÈí¼þ£¬¶ÔÈ«Çò×éÖ¯µÄÓ°ÏìÁè¼ÝÁË6%£¬Æä´ÎÊÇAgentTesla£¬È«ÇòÓ°ÏìΪ5%¡£½ÌÓýºÍÑо¿ÐÐÒµÈÔÈ»ÊÇÈ«ÇòÊܵ½¹¥»÷×îÑÏÖØµÄÐÐÒµ£¬Æä´ÎÊÇÕþ¸®¾ü¶ÓÒÔ¼°Ò½ÁƱ£½¡ÐÐÒµ¡£×î³£±»ÀûÓõÄ©¶´ÎªWeb·þÎñÆ÷̻¶µÄGit´æ´¢¿âÐÅϢй¶ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´ÐЩ¶´¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þÊÇAnubis£¬Æä´ÎÊÇHiddadºÍAhMyth¡£
https://blog.checkpoint.com/2023/02/13/january-2023s-most-wanted-malware-infostealer-vidar-makes-a-return-while-earth-bogle-njrat-malware-campaign-strikes/
6¡¢AhnlabÐû²¼¹ØÓÚDalbitÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß
AhnlabÔÚ2ÔÂ13ÈÕÐû²¼Á˹ØÓÚDalbitÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£×Ô2022ÄêÒÔÀ´£¬¸ÃÍÅ»ïÒѶԺ«¹ú¹«Ë¾½øÐÐÁË50¶à´Î¹¥»÷£¬´ó¶àÊýÊÇÖÐСÐ͹«Ë¾£¬Éæ¼°¼¼Êõ¡¢¹¤Òµ¡¢»¯¹¤¡¢½¨ÖþºÍÆû³µµÈÐÐÒµµÄ×éÖ¯¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÀûÓé¶´»ñµÃ·ÃÎÊȨÏÞ£¬ÊµÑéʹÓÃWebShellµÈ¹¤¾ßÀ´¿ØÖÆÏµÍ³¡£È»ºóÀûÓÃÍøÂçɨÃ蹤¾ßºÍÕË»§ÍµÇÔ¹¤¾ßµÈ½øÐÐÄÚ²¿Õì²ìºÍÇÔÈ¡ÐÅÏ¢¡£×îÖÕ£¬¹¥»÷ÕßÔÚÇÔÈ¡ÁËËûÃÇÏëÒªµÄËùÓÐÐÅÏ¢ºó£¬»áʹÓÃBitLocker¼ÓÃÜijЩÇý¶¯Æ÷²¢Ë÷ÒªÊê½ð¡£
https://asec.ahnlab.com/en/47455/