ResecurityÌåÏÖ2022ÄêQ2Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ÊÂÎñÔöÌí
Ðû²¼Ê±¼ä 2022-07-081¡¢ResecurityÌåÏÖ2022ÄêQ2Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ÊÂÎñÔöÌí
7ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ResecurityÐû²¼±¨¸æ³ÆÔÚ2022ÄêµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬£¬Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ÊÂÎñÔöÌí¡£¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬£¬¹¥»÷Õß»áʹÓÃÉ繤¹¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬×î½üµÄÇ÷ÊÆÊÇÕë¶ÔÖ÷ÒªµÄÊÖÒÕ¹«Ë¾ºÍÔÚÏßЧÀÍ£¨Èç Apple¡¢Facebook (Meta)¡¢Snapchat¡¢Discord£©·¢ËÍαÔìµÄ´«Æ±ºÍEDR£¨½ôÆÈÊý¾ÝÇëÇ󣩣¬£¬£¬£¬£¬£¬À´ÍøÂçÓÐ¹ØÆäÄ¿µÄµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£ResecurityÔÚ¶à¸ö°µÍøÊг¡Öз¢Ã÷³öÊÛ¾¯Ô±µÄÕÊ»§ºÍƾ֤£¨µç×ÓÓʼþ¡¢VPNºÍSSOµÈ£©µÄÇéÐΡ£¡£¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬´ËÀà¶ñÒâ»î¶¯ÔÚÀ¶¡ÃÀÖÞ¡¢¶«ÄÏÑǹú¼ÒºÍÀ밶˾·¨Í³ÁìÇøÓÈΪÏÔ×Å¡£¡£¡£¡£¡£¡£
https://resecurity.com/blog/article/cybercriminals-are-targeting-law-enforcement-agencies-worldwide
2¡¢CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄ10¸öÎó²î
CiscoÔÚ7ÔÂ6ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÉæ¼°¶à¿î²úÆ·µÄ10¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÊÇÓ°ÏìCisco ExpresswayϵÁкÍCisco TelePresence Video Communication Server(VCS)µÄÎó²î£¨CVE-2022-20812ºÍCVE-2022-20813£©£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´ÁýÕÖí§ÒâÎļþ»ò¶ÔÄ¿µÄ×°±¸¾ÙÐпÕ×Ö½ÚÖж¾¹¥»÷¡£¡£¡£¡£¡£¡£Æä´Î£¬£¬£¬£¬£¬£¬ÊÇSmart Software Manager On-PremÖеÄÒ»¸öÎó²î£¨CVE-2022-20808£©£¬£¬£¬£¬£¬£¬¿É±»¾ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐоܾøÐ§ÀÍ(DoS)¹¥»÷¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/07/cisco-and-fortinet-release-security.html
3¡¢Ó볯ÏÊÏà¹ØµÄÀÕË÷Èí¼þMauiÕë¶ÔÃÀ¹ú¸÷µØµÄÒ½ÁÆ»ú¹¹
7ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úFBI¡¢CISAºÍ²ÆÎñ²¿Ðû²¼ÁªºÏ×Éѯ£¬£¬£¬£¬£¬£¬³ÆÓ볯ÏÊÓйصĹ¥»÷ÕßʹÓÃÀÕË÷Èí¼þMaui¹¥»÷ÆäÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)×éÖ¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021Äê5ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃMaui¼ÓÃÜÈÏÕæÒ½ÁÆÐ§À͵ÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬°üÀ¨µç×Ó¿µ½¡¼Í¼ЧÀÍ¡¢Õï¶ÏЧÀÍ¡¢³ÉÏñЧÀͺÍÄÚÍøÐ§ÀÍ¡£¡£¡£¡£¡£¡£StairwellÔÚ2022Äê4ÔÂÍøÂçÁ˵ÚÒ»¸öMauiÑù±¾£¬£¬£¬£¬£¬£¬µ«ËùÓÐMauiµÄ±àÒëʱ¼ä´Á¾ùΪ2021Äê4ÔÂ15ÈÕ¡£¡£¡£¡£¡£¡£ÓëÆäËüÀÕË÷Èí¼þ²î±ðµÄÊÇ£¬£¬£¬£¬£¬£¬Maui²»»áÔÚ±»¼ÓÃܵÄϵͳÉÏÁôÏÂÀÕË÷×ÖÌõ¡£¡£¡£¡£¡£¡£ÕâЩ»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷¿ÉÄÜ»¹»á¼ÌÐø£¬£¬£¬£¬£¬£¬²¢ÎªHPH×éÖ¯ÌṩÁËһϵÁв½·¥À´×¼±¸¡¢Ô¤·ÀºÍÓ¦¶Ô´ËÀàÊÂÎñ¡£¡£¡£¡£¡£¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/07/06/north-korean-state-sponsored-cyber-actors-use-maui-ransomware
4¡¢SecuInfra͸¶Bitter¼ÌÐø¹¥»÷ÃϼÓÀ¹úµÄ¾üÊ»ú¹¹
SecuInfraÔÚ7ÔÂ5ÈÕ͸¶ÆäÔÚ½üÆÚ·¢Ã÷£¬£¬£¬£¬£¬£¬APT×éÖ¯Bitter£¨Ò²³ÆT-APT-17£©Õë¶ÔÃϼÓÀ¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2013Äê¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°Í»ù˹̹¡£¡£¡£¡£¡£¡£×îÐµĹ¥»÷ÊÇÔÚ2022Äê5ÔÂÖÐÑ®×îÏȵ쬣¬£¬£¬£¬£¬Ê¼ÓÚÒ»¸öÎäÆ÷»¯µÄExcelÎĵµ£¬£¬£¬£¬£¬£¬¸ÃÎĵµ¿ÉÄÜͨ¹ýÓã²æÊ½´¹ÂÚÓʼþ·Ö·¢µÄ£¬£¬£¬£¬£¬£¬ÓʼþÔÚ±»·¿ªÊ±»áʹÓÃMicrosoft¹«Ê½±à¼Æ÷Îó²î(CVE-2018-0798)´ÓÔ¶³ÌЧÀÍÆ÷ÖÐÏÂÔØÏÂÒ»½×¶ÎµÄ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬ÏÂÔØµÄpayloadÊÇZxxZ£¬£¬£¬£¬£¬£¬¹¥»÷»¹Ê¹ÓÃÁ˶ñÒâÈí¼þBitterRAT¡£¡£¡£¡£¡£¡£
https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-to-target-bangladesh/
5¡¢Unit 42·¢Ã÷ºÚ¿ÍÀÄÓúì¶ÓÉøÍ¸¹¤¾ßBRc4µÄ¹¥»÷»î¶¯
¾ÝýÌå7ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Unit 42·¢Ã÷ÓÐÒ»¸ö°üÀ¨ÓëBrute Ratel C4(BRc4)Ïà¹ØµÄpayload¶ñÒâÈí¼þÑù±¾±»ÉÏ´«µ½VirusTotalÊý¾Ý¿â¡£¡£¡£¡£¡£¡£BRc4ÓÉÇå¾²Ñо¿Ö°Ô±Chetan Nayak¿ª·¢£¬£¬£¬£¬£¬£¬ÀàËÆÓÚCobalt Strike£¬£¬£¬£¬£¬£¬ÊÇ×îÐÂÉÏÊеĺì¶ÓºÍ¶Ô¿¹ÐÔ¹¥»÷Ä£Ä⹤¾ß¡£¡£¡£¡£¡£¡£¸ÃÑù±¾ÊÇ´Ó˹ÀïÀ¼¿¨ÉÏ´«µÄ£¬£¬£¬£¬£¬£¬Î±×°³ÉRoshan BandaraµÄСÎÒ˽¼Ò¼òÀú£¨"Roshan_CV.iso"£©£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇÒ»¸ö¹âÅ̾µÏñÎļþ¡£¡£¡£¡£¡£¡£µ±Ä¿µÄË«»÷¸ÃÎļþʱ£¬£¬£¬£¬£¬£¬»á½«Æä¹ÒÔØÎªÒ»¸öWindowsÇý¶¯Æ÷£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸ö¿´ËÆÎÞº¦µÄWordÎĵµ¡£¡£¡£¡£¡£¡£Æô¶¯ºó£¬£¬£¬£¬£¬£¬Ëü»áÔÚÄ¿µÄ×°±¸ÉÏ×°ÖÃBRc4£¬£¬£¬£¬£¬£¬²¢ÓëÔ¶³ÌЧÀÍÆ÷½¨ÉèͨѶ¡£¡£¡£¡£¡£¡£Í¨¹ý´ò°ü·½·¨£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«¸Ã»î¶¯¹éÒòÓÚAPT29¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/07/hackers-abusing-brc4-red-team.html
6¡¢IntezerÐû²¼¹ØÓÚÐÂLinux¶ñÒâÈí¼þOrBitµÄÆÊÎö±¨¸æ
7ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬IntezerÅû¶ÁËÒ»ÖÖȫеÄLinux¶ñÒâÈí¼þOrBit£¬£¬£¬£¬£¬£¬Õâ±ê¼Ç×ÅÕë¶ÔÊ¢ÐвÙ×÷ϵͳµÄ¹¥»÷»î¶¯µÄÔöÌí¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʵÏÖÁËÏȽøµÄÈÆ¹ýÊÖÒÕ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýhookÒªº¦¹¦Ð§ÔÚ×°±¸ÉÏ»ñµÃ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬Í¨¹ýSSHΪ¹¥»÷ÕßÌṩԶ³Ì»á¼û¹¦Ð§£¬£¬£¬£¬£¬£¬ÍøÂçÆ¾Ö¤²¢¼Í¼TTYÏÂÁî¡£¡£¡£¡£¡£¡£Æä¹¦Ð§ºÜÏñSymbiote£¬£¬£¬£¬£¬£¬Ö¼ÔÚѬȾĿµÄÉÏËùÓÐÕýÔÚÔËÐеÄÀú³Ì¡£¡£¡£¡£¡£¡£µ«ºóÕßʹÓÃLD_PRELOADÇéÐαäÁ¿À´¼ÓÔØ¹²Ïí¹¤¾ß£¬£¬£¬£¬£¬£¬¶øOrBit½ÓÄÉÁËÁ½ÖÖ²î±ðµÄÒªÁ죺½«¹²Ïí¹¤¾ßÌí¼Óµ½¼ÓÔØ³ÌÐòʹÓõÄÉèÖÃÎļþÖУ»£»£»£»Ð޸ļÓÔØ³ÌÐò×Ô¼ºµÄ¶þ½øÖÆÎļþÀ´¼ÓÔØ¶ñÒâ¹²Ïí¹¤¾ß¡£¡£¡£¡£¡£¡£
https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/


¾©¹«Íø°²±¸11010802024551ºÅ