ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»£»NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶
Ðû²¼Ê±¼ä 2021-01-071.ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷

ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/
2.Intezer·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦ÓÃ

Intezer Labs·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Óᣡ£¡£¡£¸Ã»î¶¯ÔçÔÚ2020Äê1ÔÂ8ÈÕ¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬¿ÉÊÇÔÚ2020Äê12Ô²ű»·¢Ã÷¡£¡£¡£¡£ºÚ¿ÍÖ÷ÒªÒÀÀµÓÚÈý¸öÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄÓ¦ÓÃJamm¡¢eTrade/KintumºÍDaoPokerÀ´·Ö·¢¶ñÒâÈí¼þElectroRAT¡£¡£¡£¡£ElectroRAT¾ßÓм«Ç¿µÄÇÖÈëÐÔ£¬£¬£¬£¬£¬¾ßÓмüÅ̼ͼ¡¢½ØÍ¼¡¢ÉÏ´«Îļþ¡¢ÏÂÔØÎļþÒÔ¼°ÔÚÄ¿µÄ¿ØÖÆÌ¨ÉÏÖ´ÐÐÏÂÁîµÈ¹¦Ð§£¬£¬£¬£¬£¬ÏÖÔÚ¿ÉÄÜÒѾѬȾÁËԼĪ6500¸öÓû§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-target-cryptocurrency-users-with-new-electrorat-malware/
3.°ÄÕþ¸®ÖÒÑÔ·¸·¨ÍÅ»ïð³äÆäÍøÂçÇå¾²ÖÐÐÄ·Ö·¢¶ñÒâÈí¼þ

°Ä´óÀûÑÇÕþ¸®ÖÒÑԳƣ¬£¬£¬£¬£¬·¸·¨ÍÅ»ïð³ä°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¸ÃÍÅ»ïÓÕʹÊܺ¦Õß×°ÖÃÔ¶³ÌÖÎÀíºÍ×ÀÃæ¹²ÏíÈí¼þ£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÓû§µÄÒøÐÐÐÅÏ¢¡£¡£¡£¡£ÆäÊ×ÏÈʹÓÃαװ³ÉACSC¹Ù·½ÐÂÎŵĵç×ÓÓʼþ£¬£¬£¬£¬£¬¼û¸æÊܺ¦ÕßµçÄÔÒѾ±»ÈëÇÖ£¬£¬£¬£¬£¬ÐèҪͨ¹ý¶ñÒâÁ´½ÓÏÂÔØ¼ÙµÄɱ¶¾Èí¼þ¡£¡£¡£¡£Ò»µ©Óû§ÏÂÔØ²¢Æô¶¯ºó£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í¿ÉÄܽÓÊÜÆäÅÌËã»ú²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬¸ÃÍŻﻹ»áʹÓÃαÔìµÄµç»°ºÅÂë¸øÊܺ¦Õß´òµç»°£¬£¬£¬£¬£¬ÒªÇóËûÃÇÏÂÔØTeamViewer»òAnyDeskÓ¦Ó㬣¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/australian-cybersecurity-agency-used-as-cover-in-malware-campaign/
4.Check PointÐû²¼Õë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ

Check PointÐû²¼ÁËÕë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬×Ô2020Äê11ÔÂ1ÈÕÒÔÀ´È«ÇòÕë¶ÔÒ½ÁÆÐÐÒµµÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÁè¼Ý45£¥£¬£¬£¬£¬£¬¶øÕë¶ÔÆäËûÐÐÒµµÄ¹¥»÷ƽ¾ùÔöÌíÁË22£¥£»£»£»£»£»£»ÔÚ11ÔÂÿ¸ö×é֯ƽ¾ùÿÖÜÔâµ½626´Î¹¥»÷£»£»£»£»£»£»Éæ¼°µ½ÀÕË÷Èí¼þ¡¢½©Ê¬ÍøÂç¡¢Ô¶³Ì´úÂëÖ´ÐкÍDDoSµÄ¹¥»÷ÔÚ11Ô·ݶ¼ÓÐËùÔöÌí£¬£¬£¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷µÄÔöÌí×îΪÏÔ×Å£»£»£»£»£»£»¹¥»÷ÖÐʹÓõÄÖ÷ÒªÀÕË÷Èí¼þÊÇRyuk£¬£¬£¬£¬£¬Æä´ÎÊÇSodinokibi¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/01/05/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again/
5.ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý²¢³ÆÓû³öÊÛ¸ü¶à

ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬²¢³ÆÓû³öÊÛ¸ü¶àExpress¡¢SantanderºÍBanamexÒøÐпͻ§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£´Ë´Îй¶µÄ10000Ìõ¼Í¼°üÀ¨ÍêÕûµÄÃÀ¹úExpressÐÅÓÿ¨ºÅºÍ¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÐԱ𣬣¬£¬£¬£¬¿ÉÊDz¢Ã»ÓÐÐÅÓÿ¨µÄµ½ÆÚÈÕÆÚ¡¢ÃÜÂë»òÃô¸ÐµÄ²ÆÎñÊý¾Ý¡£¡£¡£¡£Âô·½ÌåÏÖ²¢²»³öÊÛÃÜÂëºÍÉí·ÝÖ¤ºÅµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬ÕâЩÊý¾Ý½ö»á±»ÓÃÓÚÀ¬»øÓʼþ»òÓªÏú¹ã¸æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-posts-data-of-10-000-american-express-accounts-for-free/
6.NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶

NISSAN±±ÃÀ·Ö¹«Ë¾ÒòÔÚBitbucket GitЧÀÍÆ÷ÖÐʹÓÃÁËĬÈÏÆ¾Ö¤admin/admin£¬£¬£¬£¬£¬µ¼ÖÂÆäÒÆ¶¯Ó¦ÓóÌÐòºÍÄÚ²¿¹¤¾ßµÄÔ´´úÂëй¶¡£¡£¡£¡£´Ë´Îй¶µÄÔ´´úÂë°üÀ¨ÈÕ²úNA MobileÓ¦Óá¢ÈÕ²úASISTÕï¶Ï¹¤¾ßµÄijЩ²¿·Ö¡¢¾ÏúÉÌӪҵϵͳ/¾ÏúÉÌÃÅ»§¡¢ÈÕ²úÄÚ²¿½¹µãmobile library¡¢ÈÕ²ú/Ó¢·ÆÄáµÏNCAR/ICARЧÀÍ¡¢¿Í»§»ñÈ¡ºÍ±£´æ¹¤¾ß¡¢ÏúÊÛ/Êг¡Ñо¿¹¤¾ß+Êý¾Ý¡¢ÖÖÖÖÓªÏú¹¤¾ß¡¢³µÁ¾ÎïÁ÷ÃÅ»§¡¢³µÁ¾ÁªÍøÐ§ÀÍ/ÈÕ²úÁªÍø¡¢ÒÔ¼°ÆäËüÖÖÖÖºó¶ËºÍÄÚ²¿¹¤¾ßµÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/nissan-source-code-leaked-online-after-git-repo-misconfiguration/


¾©¹«Íø°²±¸11010802024551ºÅ