΢ÈíÐû²¼2Ô·ÝÇå¾²¸üУ¬ £¬£¬°üÀ¨3¸öÒѱ»Ê¹ÓõÄÎó²î

Ðû²¼Ê±¼ä 2023-02-15
1¡¢Î¢ÈíÐû²¼2Ô·ÝÇå¾²¸üУ¬ £¬£¬°üÀ¨3¸öÒѱ»Ê¹ÓõÄÎó²î

      

2ÔÂ14ÈÕ£¬ £¬£¬Î¢ÈíÐû²¼ÁË2023Äê2ÔµÄÇå¾²¸üУ¬ £¬£¬ÐÞ¸´°üÀ¨3¸ö±»Ê¹ÓÃ0 dayÔÚÄÚµÄ77¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬ £¬£¬Òѱ»Ê¹ÓõÄÎó²î»®·ÖΪWindowsͼÐÎ×é¼þÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-21823£©£¬ £¬£¬¿ÉÓÃÀ´ÒÔSYSTEMȨÏÞÖ´ÐÐÏÂÁ£»£»Microsoft PublisherÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-21715£©£¬ £¬£¬ÌØÖÆÎĵµ¿ÉʹÓÃÆäÈÆ¹ýOfficeºêÕ½ÂÔ£»£»£»ÒÔ¼°WindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2023-23376£©£¬ £¬£¬¿ÉÓÃÀ´»ñµÃSYSTEMȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/


2¡¢Cloudflare¼ì²âµ½Õë¶ÔÆä¿Í»§µÄ´ó¹æÄ£DDoS¹¥»÷

      

¾ÝýÌå2ÔÂ14ÈÕ±¨µÀ£¬ £¬£¬Cloudflare¼ì²âµ½ÊýÊ®´Î³¬´óÈÝÁ¿DDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬ £¬£¬´ó´ó¶¼¹¥»÷µÄ·åÖµÔÚÿÃë50-70°ÙÍò¸öÇëÇó(rps)×óÓÒ£¬ £¬£¬×î´ó·åÖµÁè¼Ý7100Íòrps£¬ £¬£¬ÕâÊÇÆù½ñΪֹ×î´ó¹æÄ£µÄHTTP DDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»ùÓÚHTTP/2£¬ £¬£¬ÊÇʹÓÃÀ´×Ô¶à¸öÔÆÌṩÉ̵Ä30000¶à¸öIPµØµãÕë¶ÔÖÖÖÖÄ¿µÄÌᳫµÄ£¬ £¬£¬°üÀ¨ÓÎÏ·ÌṩÉÌ¡¢ÔÆÅÌËãÆ½Ì¨¡¢¼ÓÃÜÇ®±Ò¹«Ë¾ºÍÍйÜÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÒ»ÄêÀ £¬£¬Ñо¿Ö°Ô±¿´µ½Á˸ü¶àÀ´×ÔÓÚÔÆÅÌË㹩ӦÉ̵Ĺ¥»÷¡£¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html


3¡¢Phylum·¢Ã÷451¸öÖ¼ÔÚÐ®ÖÆ¼ÓÃÜÇ®±ÒÉúÒâµÄ¶ñÒâPyPI°ü

      

PhylumÔÚ2ÔÂ10ÈÕ³ÆÆä·¢Ã÷451¸ö¶ñÒâPyPI°ü£¬ £¬£¬Ö¼ÔÚͨ¹ý×°ÖöñÒâÀ©Õ¹Ð®ÖÆ»ùÓÚä¯ÀÀÆ÷µÄ¼ÓÃÜÇ®±ÒÉúÒâ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÊÇ×î³õÓÚ2022Äê11Ô·¢Ã÷µÄ»î¶¯µÄÑÓÐø£¬ £¬£¬ÆäʱֻÓÐ27¸ö¶ñÒâPyPi°ü¡£¡£¡£¡£¡£¡£¡£¡£Ôڴ˴λÖб»Ä£ÄâµÄÊ¢ÐÐÈí¼þ°ü°üÀ¨bitcoinlib¡¢ccxtºÍcryptocompareµÈ£¬ £¬£¬Ã¿¸ö¶¼ÓÐ13µ½38¸ö°æ±¾£¬ £¬£¬ÊÔͼÁýÕÖ¿ÉÄܵÄÖÖÖÖ¹ýʧÀàÐÍ¡£¡£¡£¡£¡£¡£¡£¡£ÎªÁËÈÆ¹ý¼ì²â£¬ £¬£¬¹¥»÷ÕßʹÓÃËæ»úµÄ16λÖÐÎĺº×Ö×éÏàÖúΪº¯ÊýºÍ±äÁ¿±êʶ·û¡£¡£¡£¡£¡£¡£¡£¡£


https://blog.phylum.io/phylum-discovers-revived-crypto-wallet-address-replacement-attack


4¡¢Group-IB͸¶Æä½üÆÚÔâµ½À´×ÔTonto TeamÍÅ»ïµÄ¹¥»÷

      

Group-IBÓÚ2ÔÂ13ÈÕ͸¶£¬ £¬£¬Æä¼ì²â²¢×èÖ¹ÁËÀ´×ÔAPTÍÅ»ïTonto TeamµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2022Äê6Ô£¬ £¬£¬ÕâÊǵڶþ´ÎÕë¶ÔGroup-IBµÄ¹¥»÷£¬ £¬£¬µÚÒ»´Î±¬·¢ÔÚ2021Äê3Ô¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»·â´¹ÂÚÓʼþ£¬ £¬£¬·Ö·¢ÁËʹÓÃRoyal Road Weaponizer½¨ÉèµÄ¶ñÒâMicrosoft OfficeÎĵµ¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ¹¥»÷ʱ´ú£¬ £¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËBisonal.DoubleTºóÃÅ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеÄÏÂÔØ³ÌÐòTontoTeam.Downloader£¨ÓÖÃûQuickMute£©£¬ £¬£¬ËüÖ÷ÒªÈÏÕæ´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷ÏÂÒ»½×¶ÎµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£


https://www.group-ib.com/blog/tonto-team/


5¡¢CheckPointÐû²¼2023Äê1Ô·ÝÈ«ÇòÍþвָÊýµÄ±¨¸æ

      

2ÔÂ13ÈÕ£¬ £¬£¬Check PointÐû²¼2023Äê1Ô·ÝÈ«ÇòÍþвָÊýµÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£QbotºÍLokibotÊÇÉϸöÔÂ×î³£¼ûµÄ¶ñÒâÈí¼þ£¬ £¬£¬¶ÔÈ«Çò×éÖ¯µÄÓ°ÏìÁè¼ÝÁË6%£¬ £¬£¬Æä´ÎÊÇAgentTesla£¬ £¬£¬È«ÇòÓ°ÏìΪ5%¡£¡£¡£¡£¡£¡£¡£¡£½ÌÓýºÍÑо¿ÐÐÒµÈÔÈ»ÊÇÈ«ÇòÊܵ½¹¥»÷×îÑÏÖØµÄÐÐÒµ£¬ £¬£¬Æä´ÎÊÇÕþ¸®¾ü¶ÓÒÔ¼°Ò½ÁƱ£½¡ÐÐÒµ¡£¡£¡£¡£¡£¡£¡£¡£×î³£±»Ê¹ÓõÄÎó²îΪWebЧÀÍÆ÷̻¶µÄGit´æ´¢¿âÐÅϢй¶ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þÊÇAnubis£¬ £¬£¬Æä´ÎÊÇHiddadºÍAhMyth¡£¡£¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/2023/02/13/january-2023s-most-wanted-malware-infostealer-vidar-makes-a-return-while-earth-bogle-njrat-malware-campaign-strikes/


6¡¢AhnlabÐû²¼¹ØÓÚDalbitÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

AhnlabÔÚ2ÔÂ13ÈÕÐû²¼Á˹ØÓÚDalbitÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬ £¬£¬¸ÃÍÅ»ïÒѶԺ«¹ú¹«Ë¾¾ÙÐÐÁË50¶à´Î¹¥»÷£¬ £¬£¬´ó´ó¶¼ÊÇÖÐСÐ͹«Ë¾£¬ £¬£¬Éæ¼°ÊÖÒÕ¡¢¹¤Òµ¡¢»¯¹¤¡¢ÐÞ½¨ºÍÆû³µµÈÐÐÒµµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýʹÓÃÎó²î»ñµÃ»á¼ûȨÏÞ£¬ £¬£¬ÊµÑéʹÓÃWebShellµÈ¹¤¾ßÀ´¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£¡£¡£È»ºóʹÓÃÍøÂçɨÃ蹤¾ßºÍÕË»§ÍµÇÔ¹¤¾ßµÈ¾ÙÐÐÄÚ²¿Õì̽ºÍÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬ £¬£¬¹¥»÷ÕßÔÚÇÔÈ¡ÁËËûÃÇÏëÒªµÄËùÓÐÐÅÏ¢ºó£¬ £¬£¬»áʹÓÃBitLocker¼ÓÃÜijЩÇý¶¯Æ÷²¢Ë÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£¡£¡£


https://asec.ahnlab.com/en/47455/