CISA¡¢NSAºÍODNIÐû²¼¹ØÓÚ± £»£»£»£»£»£»¤Èí¼þ¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ

Ðû²¼Ê±¼ä 2022-09-06
1¡¢CISA¡¢NSAºÍODNIÐû²¼¹ØÓÚ± £»£»£»£»£»£»¤Èí¼þ¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ

      

9ÔÂ2ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬CISA¡¢¹ú¼ÒÇå¾²¾Ö(NSA)ºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)Ðû²¼Á˹ØÓÚ± £»£»£»£»£»£»¤Èí¼þ¹©Ó¦Á´Çå¾²µÄÖ¸ÄϵĵÚÒ»²¿·Ö£¬£¬£¬ £¬£¬£¬£¬£¬¼´± £»£»£»£»£»£»¤Èí¼þ¹©Ó¦Á´ÏµÁСª¡ª¿ª·¢Ö°Ô±ÍƼöʵ¼ù¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÌṩÁËÓйØÔõÑù¿ª·¢Çå¾²´úÂë¡¢ÑéÖ¤µÚÈý·½×é¼þ¡¢Ç¿»¯¹¹½¨ÇéÐκͽ»¸¶´úÂëµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£ÔÚËùÓÐDevOps³ÉΪDevSecOps֮ǰ£¬£¬£¬ £¬£¬£¬£¬£¬Èí¼þ¿ª±¬·¢ÃüÖÜÆÚÃæÁÙΣº¦¡£¡£¡£¡£¡£±¾ÏµÁеÄÁíÍâÁ½¸ö²¿·Ö×ÅÖØÓÚÈí¼þ¹©Ó¦É̺Ϳͻ§¡£¡£¡£¡£¡£CISAÃãÀø×éÖ¯¡¢Èí¼þ¹©Ó¦É̺ÍÍøÂçÔËÓªÉÌÉó²éÖ¸Äϲ¢Ë¼Á¿½¨Òé¡£¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/09/02/cisa-nsa-and-odni-release-part-one-guidance-securing-software


2¡¢Armorblox·¢Ã÷Õë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵Ĵ¹ÂÚ¹¥»÷»î¶¯

      

¾Ý9ÔÂ4ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬Çå¾²¹«Ë¾Armorblox·¢Ã÷ÁËÕë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵ÄÐÂÒ»ÂÖ´¹Âڻ¡£¡£¡£¡£¡£´¹ÂÚÓʼþµÄÖ÷ÌâÊÇ¡°¹ØÓÚÄúµÄÕÊ»§µÄÖ÷Ҫ֪ͨ¡±£¬£¬£¬ £¬£¬£¬£¬£¬·­¿ªºó»áÓÕʹĿµÄµã»÷¶ñÒ⸽¼þÒÔÉó²éÇå¾²ÐÂÎÅ¡£¡£¡£¡£¡£Ä¿µÄµã»÷¶ñÒ⸽¼þºó»á±»Öض¨Ïòµ½Î±ÔìµÄÃÀ¹úÔËͨµÇÂ¼Ò³Ãæ£¬£¬£¬ £¬£¬£¬£¬£¬²¢±»ÒªÇóÊäÈëÓû§IDºÍÃÜÂ룬£¬£¬ £¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄµÄPIIÊý¾Ý¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÆ¹ýÁËÍâµØGoogle Workspaceµç×ÓÓʼþÇå¾²¿ØÖÆ£¬£¬£¬ £¬£¬£¬£¬£¬ÓÉÓÚËüͨ¹ýÁËDKIMºÍSPFµç×ÓÓʼþÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/135292/hacking/phishing-scam-targets-american-express.html


3¡¢DESORDENÈëÇÖÓ¡Äṫ˾BOGA GroupÇÔÈ¡ÊýÊ®ÍòÌõ¼Í¼

      

¾ÝýÌå9ÔÂ2ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍÍŻ﹥»÷ÁËÓ¡¶ÈÄáÎ÷ÑǵÄÒ»¼Ò´óÐÍÆóÒµBOGA Group¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¡¶ÈÄáÎ÷ÑǺÍÂíÀ´Î÷ÑÇı»®×ÅÁè¼Ý200¼Ò²ÍÌüºÍ°ÂÌØÀ³Ë¹¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ£¬£¬£¬ £¬£¬£¬£¬£¬ÎªÁË֤ʵÒÑÈëÇָù«Ë¾µÄЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬£¬ÆäÔÚÏÂÔØÊý¾Ýºó»¹ÔÚЧÀÍÆ÷ÉÑþ³ØýÁËÕâЩÊý¾Ý¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÇÔÈ¡ÁËÁè¼Ý31 GBµÄÊý¾ÝºÍÎļþ£¬£¬£¬ £¬£¬£¬£¬£¬°üÀ¨409168Ìõ¿Í»§ÐÅÏ¢£¨ÐÕÃû¡¢µç»°ºÍµç×ÓÓʼþ£©¡¢16476ÌõÔ±¹¤ÒÔ¼°²ÆÎñºÍ¹«Ë¾Êý¾Ý¡£¡£¡£¡£¡£DESORDEN»¹ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬ËûÃÇÔ¤¼Æ»á¶Ôº«¹ú¡¢Öйų́Íå¡¢Ô½ÄϺÍÈÕ±¾¾ÙÐиü¶à¹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬²¢¶ÔÌ©¹úµÄÊý¾Ý¸ÐÐËȤ¡£¡£¡£¡£¡£


https://www.databreaches.net/customer-data-from-hundreds-of-indonesian-and-malaysian-restaurants-hacked-by-desorden/


4¡¢ZscalerÔÚPrynt StealerÖз¢Ã÷»ùÓÚTelegramµÄºóÃÅ

      

ZscalerÔÚ9ÔÂ1ÈÕÐû²¼Á˹ØÓÚPrynt StealerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Prynt StealerÊÇÒ»¸öÏà¶Ô½ÏеÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼Ò×壬£¬£¬ £¬£¬£¬£¬£¬ÓÉ.NET±àд¡£¡£¡£¡£¡£ËüÓë¶ñÒâÈí¼þ¼Ò×åWorldWindºÍDarkEyeºÜÊÇÏàËÆ£¬£¬£¬ £¬£¬£¬£¬£¬ÕâÅú×¢ËüÃÇ¿ÉÄÜÓÉͳһ¿ª·¢Õß¿ª·¢¡£¡£¡£¡£¡£Ñо¿ÆÊÎöÅú×¢£¬£¬£¬ £¬£¬£¬£¬£¬Æä´úÂë¿âÔ´×ÔÁíÍâÁ½¸ö¿ªÔ´¶ñÒâÈí¼þAsyncRATºÍStormKitty£¬£¬£¬ £¬£¬£¬£¬£¬²¢Ìí¼ÓÁËй¦Ð§£¬£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Ò»¸öºóÃÅTelegram channel£¬£¬£¬ £¬£¬£¬£¬£¬ÓÃÓÚÍøÂçÆäËû¹¥»÷ÕßÇÔÈ¡µÄÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔ100ÃÀÔª/Ô¡¢700ÃÀÔª/Äê»ò900ÃÀÔªÖÕÉí¶©ÔĵļÛÇ®³öÊÛ¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/no-honor-among-thieves-prynt-stealers-backdoor-exposed


5¡¢UptycsÅû¶һ¸öËÆºõÈÔÔÚ¿ª·¢ÖеÄÐÂLinuxÀÕË÷Èí¼þ 

      

9ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬UptycsÅû¶ÁËÒ»¸ö¿ÉÖ´ÐкͿÉÁ´½ÓÃûÌÃ(ELF) ÀÕË÷Èí¼þ£¬£¬£¬ £¬£¬£¬£¬£¬Ëüƾ֤¸ø¶¨µÄÎļþ¼Ð·¾¶¼ÓÃÜLinuxϵͳÖеÄÎļþ¡£¡£¡£¡£¡£¹¥»÷ÕßÁôϵÄREADMEÓëÀÕË÷Èí¼þDarkAngelsµÄREADMEÍêÈ«ÎǺÏ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ELFÎļþ×Ô¼ºÊÇе쬣¬£¬ £¬£¬£¬£¬£¬µ«¶þ½øÖÆÎļþÖеÄOnionÁ´½ÓËÆºõÒѹرգ¬£¬£¬ £¬£¬£¬£¬£¬ÕâÅú×¢Õâ¸öеÄÀÕË÷Èí¼þ¿ÉÄÜÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬¶þ½øÖÆÎļþʹÓÃpthread_createº¯ÊýÀ´½¨ÉèÐÂỊ̈߳¬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÎļþºóÌí¼ÓµÄÀ©Õ¹ÃûÊÇ.crypted¡£¡£¡£¡£¡£


https://www.uptycs.com/blog/another-ransomware-for-linux-likely-in-development


6¡¢QNAPÐû²¼¸üУ¬£¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´±»ÀÕË÷Èí¼þDeadboltʹÓõÄÎó²î

      

¾ÝýÌå9ÔÂ5ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬QNAP¼ì²âµ½DeadboltʹÓÃPhoto StationÖÐÎó²îµÄÀÕË÷¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷´ÓÉÏ´ÓÖÜÁù×îÏÈ£¬£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ·¢Ã÷¹¥»÷ºóµÄ12СʱÄÚÐû²¼Á˲¹¶¡£¡£¡£¡£¡£¬£¬£¬ £¬£¬£¬£¬£¬µ«¹¥»÷ÏÖÔÚÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£¹¥»÷µÄ¹æÄ£ºÜ¹ã£¬£¬£¬ £¬£¬£¬£¬£¬ÖÜÁùºÍÖÜÈÕÌá½»µÄID RansomwareЧÀͼ¤Ôö¡£¡£¡£¡£¡£¸Ã¹«Ë¾±Þ²ßNAS¿Í»§Á¬Ã¦½«Photo Station¸üе½×îа汾£¬£¬£¬ £¬£¬£¬£¬£¬½¨ÒéÓû§ÓÃQuMagieÌæ»»Photo Station£¬£¬£¬ £¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÓû§²»Òª½«QNAP NASÖ±½ÓÅþÁ¬µ½»¥ÁªÍøÉÏ¡£¡£¡£¡£¡£×Ô2022Äê1ÔÂÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬£¬DeadBoltÒ»Ö±ÔÚ¹¥»÷NAS×°±¸¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/qnap-patches-zero-day-used-in-new-deadbolt-ransomware-attacks/