ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â

Ðû²¼Ê±¼ä 2021-01-29

1.ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª


1.png


ÔÚÅ·ÖÞÐ̾¯×éÖ¯ÆÆ»ñEmotet½©Ê¬ÍøÂçµÄͳһÌ죬£¬£¬£¬ÃÀ¹úºÍ±£¼ÓÀûÑÇÕþ¸®ÁªºÏµ·»ÙÁË2020Äê×î»îÔ¾µÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»NetWalkerµÄ»ù´¡ÉèÊ©¡£¡£´Ë´ÎÐж¯¾Ð²¶ÁËÒ»Ãû¼ÓÄôóÏÓÒÉÈËVachon Desjardins£¬£¬£¬£¬»¹½É»ñÁËÍйÜ×ÅÊý¾ÝÐ¹Â¶ÍøÕ¾µÄЧÀÍÆ÷¡£¡£¾ÝÃÀ¹úÕþ¸®³Æ£¬£¬£¬£¬NetWalkerÒѹ¥»÷ÁËÀ´×Ô27¸ö²î±ð¹ú¼ÒµÄÖÁÉÙ305ÃûÊܺ¦Õß¡£¡£McAfee³ÆNetWalkerÒÑÓ¯ÀûÁè¼Ý2500ÍòÃÀÔª£¬£¬£¬£¬¶øÇø¿éÁ´ÆÊÎö¹«Ë¾ChainalysisÌåÏÖNetWalker 2020ÄêÓ¯Àû¿ÉÄÜÁè¼Ý4600ÍòÃÀÔª£¬£¬£¬£¬½ö´ÎÓÚRyuk¡¢Maze¡¢DoppelpaymerºÍSodinokibi¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113944/cyber-crime/netwalker-ransowmare-dismantled.html


2.TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â


2.png


AT£¦TµÄÑо¿Ö°Ô±·¢Ã÷TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â¡£¡£TeamTNTÒÔ»ùÓÚÔÆµÄ¹¥»÷¶øÖøÃû£¬£¬£¬£¬ÀýÈçʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©Æ¾Ö¤À´ÇÖÈëÔÆ£¬£¬£¬£¬²¢ÓÃÆäÀ´ÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£¡£¿£¿£¿£¿£¿£¿ªÔ´¹¤¾ßlibprocesshiderÊÇ2014Äê±»·ÅÔÚGithubÉϵÄ£¬£¬£¬£¬¿ÉʹÓÃldÔ¤¼ÓÔØÆ÷ÔÚLinuxÏÂÒþ²ØÀú³Ì¡£¡£ºÚ¿Í½ÓÄÉbase64±àÂëµÄ¾ç±¾£¬£¬£¬£¬½«¸Ã¹¤¾ßÒþ²ØÔÚTeamTNT cryptominerµÄ¶þ½øÖÆÎļþÖУ¬£¬£¬£¬Ö¼ÔÚ´ÓÀú³ÌÐÅÏ¢³ÌÐò£¨ÀýÈçpsºÍlsof£©ÖÐÒþ²Ø¶ñÒâÀú³ÌÒÔÈÆ¹ý¼ì²â¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/teamtnt-cloaks-malware-open-source-tool/163414/


3.Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â


3.png


Ñо¿Ö°Ô±RyotaKÅû¶VS Code±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â¡£¡£¸ÃÎó²îλÓÚVS CodeµÄÒ»Á¬¼¯³É£¨CI£©¾ç±¾µÄvscode-github-triage-actions´æ´¢¿âÖУ¬£¬£¬£¬ÓÉÓÚÔÚclosedWithÏÂÁîÖÐȱÉÙÉí·ÝÑéÖ¤¼ì²é£¬£¬£¬£¬²¢ÇÒÓÃÓÚÑéÖ¤¹Ø±Õ×¢Ê͵ÄÕýÔò±í´ïʽ±£´æÈ±ÏÝ£¬£¬£¬£¬µ¼ÖÂÈκÎÈ˶¼¿ÉÒÔÔÚclosewithÖµÖÐ×¢Èë´úÂë¡£¡£RyotaK·¢Ã÷¿ÉʹÓøÃÎó²î»ñµÃVS Code GitHub´æ´¢¿âµÄÊÚȨÁîÅÆ£¬£¬£¬£¬²¢ÄÜ¶ÔÆä¾ÙÐжÁд¡£¡£RyotaKÒÑÏòMicrosoft±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬²¢Ðû²¼ÁËÎó²îµÄPoC¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/


4.ClearskyÅû¶Àè°ÍÄÛCedar APTÕë¶ÔÈ«ÇòISPµÄÌØ¹¤»î¶¯


4.png


ClearskyÅû¶Àè°ÍÄÛCedar APT×éÖ¯Õë¶ÔÈ«ÇòµçÐÅÔËÓªÉ̺ÍISPµÄÌØ¹¤»î¶¯¡£¡£¹¥»÷ʼÓÚ2020ÄêÍ·£¬£¬£¬£¬ºÚ¿Í¹¥»÷ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢°£¼°¡¢ÒÔÉ«ÁС¢Àè°ÍÄÛ¡¢Ô¼µ©¡¢°ÍÀÕ˹̹¡¢É³Ìذ¢À­²®ºÍ°¢ÁªÇõµÄ»¥ÁªÍøÐ§ÀÍÔËÓªÉÌ£¬£¬£¬£¬Ö¼ÔÚÍøÂçÇ鱨ºÍÇÔÈ¡¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£¹¥»÷ÕßʹÓÿªÔ´¹¤¾ßɨÃèInternetÉÏδ´ò²¹¶¡µÄAtlassianºÍOracleЧÀÍÆ÷£¬£¬£¬£¬È»ºóʹÓÃÎó²îÀ´»á¼ûЧÀÍÆ÷²¢°²ÅÅWeb Shell£¬£¬£¬£¬Ö÷ҪʹÓÃÁË3¸ö1ÈÕÎó²îCVE-2019-3396¡¢CVE-2019-11581ºÍCVE-2012-3152¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113975/apt/lebanese-cedar-apt-attacks.html


5.NetscoutÐû²¼ÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


5.png


NetscoutÐû²¼ÁËÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬Ð§ÀÍÌṩÉÌÍøÂç³ÉΪÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷µÄÖØµã£¬£¬£¬£¬µçÐÅÌṩÉÌÔÚ2020ÉϰëÄêÔâµ½492807´Î¹¥»÷£¬£¬£¬£¬±È2019ÄêͬÆÚÔöÌíÁË25£¥¡£¡£±ðµÄ£¬£¬£¬£¬DDoS¹¥»÷ǰÑÔµÄÖØ´óÐÔÒ²ÔÚÔöÌí£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬Ê¹ÓÃ15¸öÒÔÉÏǰÑԵĹ¥»÷ÊýÄ¿ÔöÌíÁË2851£¥¡£¡£¶ø2020ÄêÉϰëÄê¹¥»÷µÄÍÌÍÂÁ¿£¨pps£©±È2019ÄêÔöÌíÁË31£¥£¬£¬£¬£¬¹¥»÷Ò»Á¬Ê±¼äïÔÌ­ÁË51£¥¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/blog/service-provider-ddos-attacks-are-rise


6.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ


6.png


¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼ÁËCOVID-19ÒÔÀ´ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬ÔÚ2020Äê1ÔÂÖÁ4ÔÂÖÐ×ܹ²¼ì²âµ½ÁËԼĪ907000ÌõÀ¬»øÓʼþ£¬£¬£¬£¬737ÆðÓë¶ñÒâÈí¼þÓйصÄÊÂÎñºÍ48000¸öÓëCOVID-19ÓйصÄURL¡£¡£2020Äê2ÔÂÖÁ3Ô£¬£¬£¬£¬¶ñÒâÓòÃû×¢²áÊýÄ¿ÔöÌíÁË569£¥£¬£¬£¬£¬¶øÒÉËÆ¶ñÒâÓòÃûµÄ×¢²áÊýÄ¿ÔòÔöÌíÁË788£¥¡£¡£±¨¸æ»¹Ö¸³öÍøÂç·¸·¨·Ö×ÓʹÓÃÁËÓÉCOVID-19Ôì³ÉµÄÉç»á²»ÎȹÌÐԺ;­¼ÃÐÎÊÆÔì³ÉµÄ¿Ö¾åºÍ²»È·¶¨ÐÔ£¬£¬£¬£¬ÕýÔÚÒÔ¾ªÈ˵ÄËÙÂÊÉú³¤¹¥»÷¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19