ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»£»NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶

Ðû²¼Ê±¼ä 2021-01-07

1.ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷


1.jpg


ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


2.Intezer·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦ÓÃ


2.jpg


Intezer Labs·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Óᣡ£¡£¡£¸Ã»î¶¯ÔçÔÚ2020Äê1ÔÂ8ÈÕ¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬¿ÉÊÇÔÚ2020Äê12Ô²ű»·¢Ã÷¡£¡£¡£¡£ºÚ¿ÍÖ÷ÒªÒÀÀµÓÚÈý¸öÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄÓ¦ÓÃJamm¡¢eTrade/KintumºÍDaoPokerÀ´·Ö·¢¶ñÒâÈí¼þElectroRAT¡£¡£¡£¡£ElectroRAT¾ßÓм«Ç¿µÄÇÖÈëÐÔ£¬£¬£¬£¬£¬¾ßÓмüÅ̼ͼ¡¢½ØÍ¼¡¢ÉÏ´«Îļþ¡¢ÏÂÔØÎļþÒÔ¼°ÔÚÄ¿µÄ¿ØÖÆÌ¨ÉÏÖ´ÐÐÏÂÁîµÈ¹¦Ð§£¬£¬£¬£¬£¬ÏÖÔÚ¿ÉÄÜÒѾ­Ñ¬È¾ÁËԼĪ6500¸öÓû§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-target-cryptocurrency-users-with-new-electrorat-malware/


3.°ÄÕþ¸®ÖÒÑÔ·¸·¨ÍÅ»ïð³äÆäÍøÂçÇå¾²ÖÐÐÄ·Ö·¢¶ñÒâÈí¼þ


3.png


°Ä´óÀûÑÇÕþ¸®ÖÒÑԳƣ¬£¬£¬£¬£¬·¸·¨ÍÅ»ïð³ä°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¸ÃÍÅ»ïÓÕʹÊܺ¦Õß×°ÖÃÔ¶³ÌÖÎÀíºÍ×ÀÃæ¹²ÏíÈí¼þ£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÓû§µÄÒøÐÐÐÅÏ¢¡£¡£¡£¡£ÆäÊ×ÏÈʹÓÃαװ³ÉACSC¹Ù·½ÐÂÎŵĵç×ÓÓʼþ£¬£¬£¬£¬£¬¼û¸æÊܺ¦ÕßµçÄÔÒѾ­±»ÈëÇÖ£¬£¬£¬£¬£¬ÐèҪͨ¹ý¶ñÒâÁ´½ÓÏÂÔØ¼ÙµÄɱ¶¾Èí¼þ¡£¡£¡£¡£Ò»µ©Óû§ÏÂÔØ²¢Æô¶¯ºó£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í¿ÉÄܽÓÊÜÆäÅÌËã»ú²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬¸ÃÍŻﻹ»áʹÓÃαÔìµÄµç»°ºÅÂë¸øÊܺ¦Õß´òµç»°£¬£¬£¬£¬£¬ÒªÇóËûÃÇÏÂÔØTeamViewer»òAnyDeskÓ¦Ó㬣¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/australian-cybersecurity-agency-used-as-cover-in-malware-campaign/


4.Check PointÐû²¼Õë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ


4.png


Check PointÐû²¼ÁËÕë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬×Ô2020Äê11ÔÂ1ÈÕÒÔÀ´È«ÇòÕë¶ÔÒ½ÁÆÐÐÒµµÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÁè¼Ý45£¥£¬£¬£¬£¬£¬¶øÕë¶ÔÆäËûÐÐÒµµÄ¹¥»÷ƽ¾ùÔöÌíÁË22£¥£»£»£»£»£»£»ÔÚ11ÔÂÿ¸ö×é֯ƽ¾ùÿÖÜÔâµ½626´Î¹¥»÷£»£»£»£»£»£»Éæ¼°µ½ÀÕË÷Èí¼þ¡¢½©Ê¬ÍøÂç¡¢Ô¶³Ì´úÂëÖ´ÐкÍDDoSµÄ¹¥»÷ÔÚ11Ô·ݶ¼ÓÐËùÔöÌí£¬£¬£¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷µÄÔöÌí×îΪÏÔ×Å£»£»£»£»£»£»¹¥»÷ÖÐʹÓõÄÖ÷ÒªÀÕË÷Èí¼þÊÇRyuk£¬£¬£¬£¬£¬Æä´ÎÊÇSodinokibi¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/05/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again/


5.ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý²¢³ÆÓû³öÊÛ¸ü¶à


5.png


ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬²¢³ÆÓû³öÊÛ¸ü¶àExpress¡¢SantanderºÍBanamexÒøÐпͻ§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£´Ë´Îй¶µÄ10000Ìõ¼Í¼°üÀ¨ÍêÕûµÄÃÀ¹úExpressÐÅÓÿ¨ºÅºÍ¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÐԱ𣬣¬£¬£¬£¬¿ÉÊDz¢Ã»ÓÐÐÅÓÿ¨µÄµ½ÆÚÈÕÆÚ¡¢ÃÜÂë»òÃô¸ÐµÄ²ÆÎñÊý¾Ý¡£¡£¡£¡£Âô·½ÌåÏÖ²¢²»³öÊÛÃÜÂëºÍÉí·ÝÖ¤ºÅµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬ÕâЩÊý¾Ý½ö»á±»ÓÃÓÚÀ¬»øÓʼþ»òÓªÏú¹ã¸æ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-posts-data-of-10-000-american-express-accounts-for-free/


6.NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶


6.png


NISSAN±±ÃÀ·Ö¹«Ë¾ÒòÔÚBitbucket GitЧÀÍÆ÷ÖÐʹÓÃÁËĬÈÏÆ¾Ö¤admin/admin£¬£¬£¬£¬£¬µ¼ÖÂÆäÒÆ¶¯Ó¦ÓóÌÐòºÍÄÚ²¿¹¤¾ßµÄÔ´´úÂëй¶¡£¡£¡£¡£´Ë´Îй¶µÄÔ´´úÂë°üÀ¨ÈÕ²úNA MobileÓ¦Óá¢ÈÕ²úASISTÕï¶Ï¹¤¾ßµÄijЩ²¿·Ö¡¢¾­ÏúÉÌӪҵϵͳ/¾­ÏúÉÌÃÅ»§¡¢ÈÕ²úÄÚ²¿½¹µãmobile library¡¢ÈÕ²ú/Ó¢·ÆÄáµÏNCAR/ICARЧÀÍ¡¢¿Í»§»ñÈ¡ºÍ±£´æ¹¤¾ß¡¢ÏúÊÛ/Êг¡Ñо¿¹¤¾ß+Êý¾Ý¡¢ÖÖÖÖÓªÏú¹¤¾ß¡¢³µÁ¾ÎïÁ÷ÃÅ»§¡¢³µÁ¾ÁªÍøÐ§ÀÍ/ÈÕ²úÁªÍø¡¢ÒÔ¼°ÆäËüÖÖÖÖºó¶ËºÍÄÚ²¿¹¤¾ßµÈ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nissan-source-code-leaked-online-after-git-repo-misconfiguration/