Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-06-30

1¡¢Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷

¾ÝýÌå6ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Á¢ÌÕÍðµÄ¹ú¼Ò˰Îñ¼à²ì¾Ö(STI)ºÍ»á¼ÆÐ§ÀÍÌṩÉÌB1.ltµÈ¶à¸ö×éÖ¯Ôâµ½ÁËKillnetÍÅ»ïµÄDDoS¹¥»÷¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NKSC)֤ʵ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁ˹ú¼ÒÇå¾²Êý¾Ý´«ÊäÍøÂçÒÔ¼°Ë½ÓªºÍ¹«¹²²¿·ÖµÄ×éÖ¯¡£¡£¡£²¢ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜ»áÒ»Á¬¼¸Ì죬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÕë¶ÔͨѶ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¡£¡£¡£KillnetÔÚÒ»¶ÎÊÓÆµÖÐÉù³Æ¶Ô´ËÊÂÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ôö²¹ËµËûÃÇÒѾ­¹¥»÷ÁË1652¸öÍøÂç×ÊÔ´£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ39СʱÄÚʵÏÖÁ˶ÔÁ¢ÌÕÍð70%µÄÍøÂç»ù´¡ÉèÊ©µÄ¸ôÀë¡£¡£¡£

https://www.hackread.com/russia-killnet-group-lithuania-sites-ddos-attacks/


2¡¢Service Fabric±£´æÎó²îFabricScape£¨CVE-2022-30137)

6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Unit 42Åû¶ÁË΢ÈíService FabricÖеÄÎó²îFabricScape£¨CVE-2022-30137)µÄÏêÇé¡£¡£¡£¸ÃÎó²î±£´æÓÚÕï¶ÏÍøÂçÊðÀí(DCA)×é¼þÖУ¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÉèÖÃΪ¾ßÓÐÔËÐÐʱ»á¼ûȨÏÞµÄÈÝÆ÷Éϱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬ËäÈ»±£´æÓÚÁ½¸ö²Ù×÷ϵͳƽ̨ÉÏ£¬£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÄÜÔÚLinuxÉϱ»Ê¹Óᣡ£¡£Î¢Èí͸¶³Æ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»ÓÃÀ´ÌáȨ£¬£¬£¬£¬£¬£¬£¬£¬²¢»ñµÃ¶Ô×ÊÔ´Ö÷»úSF½ÚµãºÍÕû¸ö¼¯ÈºµÄ¿ØÖÆÈ¨¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔÚService Fabric 9.0ÀÛ»ý¸üÐÂÖлñµÃÐÞ¸´¡£¡£¡£   

https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137/


3¡¢Zscaler·¢Ã÷EvilnumÍÅ»ï»ØºÏ²¢Õë¶ÔÓ¢¹úºÍÅ·ÖÞµØÇø

ZscalerÔÚ6ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬£¬£¬EvilnumÍÅ»ïÒѾ­»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËеÄÕ½Êõ¡¢ÊÖÒպͳÌÐò¡£¡£¡£½ñÄê3Ô£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÆäÄ¿µÄÑ¡ÔñÓÐÖØ´ó±ä»»£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÔ­À´µÄ½ðÈڿƼ¼ÁìÓòµÄ×é֯ת±äΪ´¦Öóͷ£¹ú¼ÊÒÆÃñЧÀ͵ÄÕþ¸®¼ä×éÖ¯¡£¡£¡£¹¥»÷ʹÓõÄÓÕ¶üÎļþͨ³£¶¼°üÀ¨ºÏ¹æ£¨compliance£©Ò»´Ê£¬£¬£¬£¬£¬£¬£¬£¬ÆäÄ£°å×¢Èë½×¶ÎʹÓõĻùÓÚºêµÄÎĵµÊ¹ÓÃÁËVBA code stompingÊÖÒÕÀ´Èƹý¾²Ì¬ÆÊÎö²¢±ÜÃâÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÑÏÖØ»ìÏýµÄJavaScriptÀ´½âÃܲ¢×°ÖÃpayload¡£¡£¡£

https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets

4¡¢Cyble³ÆÓÐÁè¼Ý90Íò¸öÉèÖùýʧµÄKubernetes̻¶ÔÚÍøÉÏ

¾Ý6ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬CybleµÄÒ»ÏîÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý900000¸öKubernetes̻¶ÔÚÍøÉÏ¡£¡£¡£KubernetesÊÇÒ»¸ö¸ß¶ÈͨÓõĿªÔ´ÈÝÆ÷±àÅÅϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÉèÖò»×¼È·£¬£¬£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õß»á¼ûÄÚ²¿×ÊÔ´ºÍ˽ÓÐ×ʲú¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÓë¹¥»÷ÕßÀàËÆµÄɨÃ蹤¾ßºÍËÑË÷ÅÌÎÊÀ´¶¨Î»Ì»Â¶µÄKubernetesʵÀý£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐ65%£¨585000̨£©Î»ÓÚÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬£¬9%λÓڵ¹ú£¬£¬£¬£¬£¬£¬£¬£¬¶øºÉÀ¼ºÍ°®¶ûÀ¼¸÷Õ¼6%£» £»£»£»£»£»£»£»Ì»Â¶×î¶àµÄTCP¶Ë¿ÚÊÇ443£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǶ˿Ú10250ºÍ6443¡£¡£¡£

https://www.infosecurity-magazine.com/news/misconfigured-kubernetes-exposed/

5¡¢ÐÂľÂíZuoRATÖ÷ÒªÕë¶ÔλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷

Lumen Black Lotus LabsÔÚ6ÔÂ28ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬ÐµĶ༶Զ³Ì»á¼ûľÂíZuoRATÒѱ»ÓÃÓÚͨ¹ýλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷¹¥»÷Ô¶³ÌÊÂÇéÖ°Ô±¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýɨÃèÒÑÖªµÄδÐÞ²¹Îó²î¶Ô·ÓÉÆ÷µÄ¾ÙÐгõʼ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬È»ºó×°ÖÃCobalt Strike beacons£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°2¸ö×Ô½ç˵ºóÃÅ£º»ùÓÚC++µÄCBeacon£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔWindowsϵͳ£» £»£»£»£»£»£»£»»ùÓÚGoµÄGoBeacon£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔLinuxºÍMacϵͳ¡£¡£¡£ZuoRAT»¹¿ÉÒÔ¼à¿ØDNSºÍHTTPSÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬£¬À´Ð®ÖÆÇëÇó²¢Ê¹ÓÃÌìÉúµÄÔ¤Éè¹æÔò½«Ä¿µÄÖØ¶¨Ïòµ½¶ñÒâÓò£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÌÈÅȡ֤ÆÊÎö¡£¡£¡£

https://www.bleepingcomputer.com/news/security/new-zuorat-malware-targets-soho-routers-in-north-america-europe/

6¡¢SymantecÐû²¼¹ØÓÚ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ

6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SymantecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ¡£¡£¡£Í¨Ì«¹ýÎö×î½üÉæ¼°BumblebeeµÄ¹¥»÷ÖÐʹÓÃµÄÆäËüÈý¸ö¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«ÆäÓëConti¡¢QuantumºÍMountlocker ÔÚÄÚµÄÐí¶àÀÕË÷ÍÅ»ïÁªÏµÆðÀ´¡£¡£¡£Æ¾Ö¤ÕâЩ½ÏÔçµÄ¹¥»÷ÖÐʹÓõÄTTPsÍÆ²â£¬£¬£¬£¬£¬£¬£¬£¬Bumblebee¿ÉÄÜÊÇ×÷ΪTrickbotºÍBazarLoaderµÄÌæ»»¼ÓÔØ³ÌÐòÍÆ³öµÄ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ±»ÊÓ²ìµÄ¹¥»÷µÄÁíÒ»¸öÅäºÏµãÊÇÕýµ±Èí¼þʹÓõÄÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬ConnectWise¡¢Atera¡¢SplashtopºÍAnyDeskµÈÔ¶³Ì×ÀÃæ¹¤¾ß¾­³£·ºÆðÔÚ´ËÀ๥»÷ÖС£¡£¡£

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime