Snow SoftwareÐû²¼2021ÄêÓйØITÖÎÀíµÄÆÊÎö±¨¸æ£»£»£»ESETÅû¶LazarusÕë¶Ôº«¹ú¹©Ó¦Á´µÄй¥»÷»î¶¯

Ðû²¼Ê±¼ä 2020-11-17
1.Snow SoftwareÐû²¼2021ÄêÓйØITÖÎÀíµÄÆÊÎö±¨¸æ


1.jpg


Snow SoftwareÐû²¼2021ÄêÓйØITÖÎÀíµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬63£¥µÄÊÜ·ÃÕß³ÆÊÖÒÕÖÎÀí±äµÃÔ½À´Ô½ÄÑÌ⣬£¬£¬£¬£¬£¬£¬ÆóÒµÔÚÈí¼þ¡¢Ó²¼þ¡¢SaaSºÍÔÆÉϵÄÊÖÒÕÖ§³öÖÜÈ«ÔöÌí¡£¡£¡£¡£¡£¡£¡£87£¥µÄITÏòµ¼ÕßÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÒÑÍùÒ»ÄêÖÐËûÃÇÒѾ­ÓÉMicrosoft¡¢IBM¡¢Oracle¡¢AdobeºÍSAPµÈÈí¼þ¹©Ó¦É̵ÄÉ󼯣¬£¬£¬£¬£¬£¬£¬Ö»ÓÐ51£¥µÄÈ˵£ÐÄÏÂÒ»ÄêµÄÉ󼯡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ç¿Ê¢µÄÊÖÒÕÇ鱨ʹITÏòµ¼ÕßÄܸüÓÐÓõؽâ¾öËûÃǵÄÖ÷ҪʹÃü£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÓÐ14%µÄITÏòµ¼ÕßµÖ´ïÁ˳ÉÊìÊÖÒÕÖÇÄܵıê×¼¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.snowsoftware.com/company/news/cios-face-competing-and-complex-priorities-2021-finds-new-snow-software-report


2.kasperskyÐû²¼Snake¶Ô¹¤¿ØÐÐÒµµÄ¹¥»÷ÆÊÎö±¨¸æ


2.jpg


kaspersky ICS CERTÐû²¼ÁËÓйØSnake¶Ô¹¤¿ØÐÐÒµµÄ¹¥»÷ÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ÷Òª·¢Ã÷°üÀ¨£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃnmon.batÎļþ¾ÙÐÐÆô¶¯£»£»£»Ëùʶ±ðµÄËùÓÐSnakeÑù±¾Ö®¼äµÄÎ¨Ò»Çø±ðÊÇ´úÂëÖÐǶÈëµÄÓòÃûºÍIPµØµã£»£»£»Ö»Óе±Ç¶ÈëÔÚ¶ñÒâÈí¼þ´úÂëÖеÄIPµØµãÓë´ÓͬÑùǶÈëÔÚ¶ñÒâÈí¼þ´úÂëÖеÄÓòÃûÆÊÎöµÄIPµØµãÏàÆ¥Åäʱ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ²Å»á¼ÓÃÜÊý¾Ý£»£»£»¹ØÓÚÿ´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ç¶ÈëÔÚ¶ñÒâÈí¼þ´úÂëÖеÄIPµØµãºÍÓòÃû×éºÏ¶¼ÊÇΨһµÄ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ics-cert.kaspersky.com/alerts/2020/06/17/targeted-attacks-on-industrial-companies-using-snake-ransomware/


3.Value DeFiÔâµ½Flash loan¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ôì³ÉÔ¼600ÍòÃÀÔªËðʧ


3.png


È¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Ð­ÒéValue DeFi³ÆÆäÉÏÖÜÁùÔâµ½ÁËFlash loan¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ôì³ÉÔ¼600ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶Ô¸Ã¹«Ë¾MultiStables½ð¿â¾ÙÐÐÁËÖØ´óµÄFlash loan¹¥»÷¡£¡£¡£¡£¡£¡£¡£Flash loan´û¿îÔÊÐíÓû§ÔÚûÓеäÖʵÄÇéÐÎϽèÈë×ʽ𣬣¬£¬£¬£¬£¬£¬ÓÉÓÚ´û·½Ô¤¼Æ×ʽð»áÁ¬Ã¦·µ»¹¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩÎÞµ£±£´û¿î£¬£¬£¬£¬£¬£¬£¬ÔÚÎȹ̱ÒÖ®¼ä¾ÙÐÐÌ×Àû¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤EtherscanµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×ܹ²´ÓDeFi½è´ûƽ̨Aave½èÓÃÁË80000ÒÔÌ«±Ò¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.coindesk.com/value-defi-suffers-6m-flash-loan-attack


4.Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÐÂEmail Appender¿ÉÈÆ¹ýɱ¶¾Èí¼þ


4.png


Gemini AdvisoryÑо¿Ö°Ô±·¢Ã÷ÐÂEmail Appender¿ÉÈÆ¹ýɱ¶¾Èí¼þ£¬£¬£¬£¬£¬£¬£¬Ð­Öú¸üÖØ´óµÄÍøÂç´¹ÂÚºÍÆóÒµµç×ÓÓʼþй¶£¨BEC£©¹¥»÷¡£¡£¡£¡£¡£¡£¡£Email AppenderʹÓÃÆ¾Ö¤Ìî³ä£¬£¬£¬£¬£¬£¬£¬ÔÚ¶àÖÖЧÀÍÉÏÖØÓÃÃÜÂë¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÓÐÓõķ¢¼þÈ˺ÍÊÕ¼þÈË×ֶΣ¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÇáËÉÈÆ¹ý·ÀÓù²½·¥£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÀ´×ª´ïڲƭÐÔÐÂÎźͰüÀ¨¶ñÒâÈí¼þµÄµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£¡ £¿£¿£¿£¿£¿£¿£¿Éͨ¹ýÆôÓöàÖØÉí·ÝÑéÖ¤¹¦Ð§Ìá·À´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-tool-lets-attackers-easily-create-reply-chain-phishing-emails/


5.˼¿ÆTalosÅû¶ÐÂRAT CRAT»òÓëAPT LazarusÓйØ


5.jpg


˼¿ÆTalosÅû¶RAT CRATCRAT¶ñÒâÈí¼þ¼Ò×åµÄа汾£¬£¬£¬£¬£¬£¬£¬»òÓëAPT LazarusÓйØ¡£¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄа汾°üÀ¨¶àÖÖRAT¹¦Ð§¡¢²å¼þºÍ¶àÖÖ¼ì²âÌÓ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÆäÖ¸±ê£¬£¬£¬£¬£¬£¬£¬Õ½Êõ¡¢ÊÖÒպͳÌÐò£¨TTP£©Ò²ÓëLazarusGroupµÄÏàËÆ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ×ÔÁ¦µÄRAT£¬£¬£¬£¬£¬£¬£¬´ÓÆäC2ЧÀÍÆ÷ÏÂÔØ²¢¼¤»îÆäËû¶ñÒâ²å¼þ£¬£¬£¬£¬£¬£¬£¬CiscoTalosÒѾ­·¢Ã÷Á˶à¸ö²å¼þ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢ÆÁÄ»²¶»ñ¡¢¼ôÌù°å¼àÊӺͼüÅ̼ͼÆ÷×é¼þ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/11/crat-and-plugins.html


6.ESETÅû¶LazarusÕë¶Ôº«¹ú¹©Ó¦Á´µÄй¥»÷»î¶¯


6.jpg


ESETÑо¿Ö°Ô±Åû¶LazarusÕë¶Ôº«¹ú¹©Ó¦Á´µÄй¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬£¬£¬LazarusÀ©´óÁ˹¥»÷¹æÄ££¬£¬£¬£¬£¬£¬£¬²»µ«ÊÇÇÔÈ¡¹«Ë¾µÄÃô¸ÐÊý¾Ý»¹ÆÆËð¼ÓÃÜÇ®±Ò×éÖ¯¡£¡£¡£¡£¡£¡£¡£ESETÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚÕâÀ๩ӦÁ´¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁ˺«¹ú»¥ÁªÍøÓû§»á¼ûÕþ¸®»ò½ðÈÚЧÀÍÍøÕ¾Ê±ÐèҪװÖÃÌØÁíÍâÇå¾²Èí¼þ¡£¡£¡£¡£¡£¡£¡£Ê×ÏÈÒªÇóÓû§ÏÂÔØWIZVERA VeraPort£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòÓÃÓÚÖÎÆÊÎö¼ûÌØ¶¨ÓòËùÐèµÄÈí¼þÏÂÔØ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ´ÓÒ»¸öÕýµ±µ«±»Ð¹Â¶µÄÍøÕ¾Ìæ»»Ô­±¾Òª½»¸¶¸øWIZVERA VeraPortÓû§µÄÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔ´ËÀ´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/lazarus-malware-strikes-south-korean-supply-chains/