ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´

Ðû²¼Ê±¼ä 2021-12-22

ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´


ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´.png


12ÔÂ18ÈÕ£¬ £¬£¬£¬£¬£¬Çå¾²¹«Ë¾Advanced Intelligence³ÆConti³ÉΪÊ׸ö½«Log4j2ÎäÆ÷»¯µÄרҵ¼¶ÀÕË÷ÔËÓªÍŻ £¬£¬£¬£¬£¬ÏÖÒÑÓµÓÐÍêÕûµÄ¹¥»÷Á´¡£¡£¡£×èÖ¹12ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ¸Ã¹¥»÷Á´Îª£ºEmotet -> Cobalt Strike -> Human Exploitation -> ȱÉÙADMIN$¹²Ïí -> Kerberoast -> VMWare vCenterЧÀÍÆ÷¡£¡£¡£Conti×Ô8Ô·Ý×îÏȾÙÐÐÁ˶à´Î¸üУ¬ £¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃеĺóÃźͱ¸·Ýɾ³ýÕ½ÂԵȡ£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/conti-ransomware-gang-has-full-log4shell-attack-chain/177173/


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515.png


12ÔÂ17ÈÕ£¬ £¬£¬£¬£¬£¬FBIÐû²¼¾¯±¨³ÆÓÐAPT×éÖ¯×Ô10ÔÂÏÂÑ®×îÏÈÒ»Ö±ÔÚÆð¾¢Ê¹ÓÃZohoÖеÄÎó²îCVE-2021-44515¡£¡£¡£ÕâÊÇManageEngine Desktop CentralÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬ £¬£¬£¬£¬£¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£FBI³Æ£¬ £¬£¬£¬£¬£¬¸ÃÍÅ»ïÈëÇÖDesktop CentralЧÀÍÆ÷ºó×°ÖÃÁýÕÖÆäÕýµ±¹¦Ð§µÄwebshell£¬ £¬£¬£¬£¬£¬È»ºóÏÂÔØÊ¹Óù¤¾ß£¬ £¬£¬£¬£¬£¬Ã¶¾ÙÓòÓû§ºÍȺ×飬 £¬£¬£¬£¬£¬¾ÙÐÐÍøÂçÕì̽£¬ £¬£¬£¬£¬£¬×îºóÊÔͼºáÏòÒÆ¶¯ºÍת´¢Æ¾Ö¤¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125821/hacking/zoho-zero-day-cve-2021-44515-fbi-alert.html


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î.png


΢ÈíÔÚ12ÔÂ20ÈÕÐû²¼Ç徲ͨ¸æ£¬ £¬£¬£¬£¬£¬±Þ²ßÓû§¾¡¿ìÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î¡£¡£¡£Õâ2¸öÎó²îΪCVE-2021-42287ºÍCVE-2021-42278£¬ £¬£¬£¬£¬£¬ÒÑÔÚ2021Äê11ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£¡£Î¢ÈíÌåÏÖ£¬ £¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâÁ½¸öÎó²î¿ÉÔÚActive DirectoryÇéÐÎÖн¨ÉèÒ»¸öÖ±½Ó»á¼ûÓòÖÎÀíÔ±Óû§µÄ·¾¶¡£¡£¡£12ÔÂ11ÈÕ£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁËʹÓÃÕâЩÎó²îµÄ¿´·¨ÑéÖ¤(PoC)¹¤¾ß£¬ £¬£¬£¬£¬£¬¾­²âÊÔÈ·¶¨¸Ã¹¤¾ß¿ÉÒÔÇáËɵؽ«Óû§È¨ÏÞÌáÉýÖÁÖÎÀíԱȨÏÞ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-easy-windows-domain-takeover-via-active-directory-bugs/


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ.png


½Ý¿ËÇå¾²¹«Ë¾AvastÔÚ12ÔÂ16ÈÕÅû¶ÁËÕë¶ÔÃÀ¹úij¹Ù·½×éÖ¯µÄAPT¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£Avast²¢Î´¹ûÕæÄ¿µÄ×éÖ¯µÄÃû³Æ£¬ £¬£¬£¬£¬£¬¾ÝThe RecordÍÆ²âÓëÃÀ¹ú¹ú¼Ê×Ú½Ì×ÔÓÉίԱ»á(USCIRF)ÓйØ¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷¹¥»÷»î¶¯ÖÐʹÓõÄ2¸ö¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬µÚÒ»¸öαװ³Éoci.dll²¢Ê¹ÓÃÕýµ±Ó¦ÓÃWinDivertÀ´ÕìÌýInternetͨѶ£»£»£»£»µÚ¶þ¸öҲαװ³ÉÁËoci.dll£¬ £¬£¬£¬£¬£¬ÊÇÒ»¸ö½âÃÜÆ÷£¬ £¬£¬£¬£¬£¬Óëred signatureÐж¯ÖÐʹÓõĶñÒâÈí¼þºÜÊÇÏàËÆ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/12/experts-discover-backdoor-deployed-on.html



T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°


T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°.png


12ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬T-MobileÌåÏÖÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°£¬ £¬£¬£¬£¬£¬Æ½¾ùÿ¸öÔÂʶ±ð»ò×èµ²ÁË18ÒÚ¸öÕ©Æ­µç»°¡£¡£¡£×èÖ¹2021Äê12ÔÂÉÏÑ®µÄÊý¾ÝÏÔʾ£¬ £¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÁ÷Á¿ÒѵִïÀúÊ·×î¸ßˮƽ£¬ £¬£¬£¬£¬£¬µÖ´ïÿÖÜԼĪ4.25ÒÚ´ÎʵÑ飬 £¬£¬£¬£¬£¬½ÏÖ®2020ÄêÔö·ùÁè¼Ý116%¡£¡£¡£Á÷Á¿×îµÍµÄÊÇ1Ô£¬ £¬£¬£¬£¬£¬ÓÐ11ÒÚ¸öÕ©Æ­µç»°£»£»£»£»µ½11Ô£¬ £¬£¬£¬£¬£¬¸ÃÊý¾Ý³ÊÖ¸ÊýÔöÌí£¬ £¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÊýÄ¿ÊÇ1Ô·ݵÄÒ»±¶£¬ £¬£¬£¬£¬£¬µÖ´ïÁË25ÒÚ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-it-blocked-21-billion-scam-calls-this-year/


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ.png


¾Ý±¨µÀ£¬ £¬£¬£¬£¬£¬×î½üÐû²¼µÄDell BIOS¸üе¼Ö¶à¿îÌõ¼Ç±¾µçÄÔºĮ́ʽ»ú·ºÆðÑÏÖØµÄÆô¶¯ÎÊÌâ¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨Dell LatitudeÌõ¼Ç±¾µçÄÔ£¨5320ºÍ5520£©£¬ £¬£¬£¬£¬£¬ÒÔ¼°Dell Inspiron 5680 ºÍAlienware Aurora R8̨ʽ»ú¡£¡£¡£ÊÜÓ°ÏìÓû§³Æµ±ËûÃÇÆô¶¯×°±¸Ê±£¬ £¬£¬£¬£¬£¬»áÖ±½Ó½øÈëÀ¶ÆÁ²¢ÔٴιرÕ¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬£¬ÔÚDellÐû²¼½â¾ö¼Æ»®Ö®Ç°£¬ £¬£¬£¬£¬£¬×î¼òÆÓµÄÐÞ¸´ÒªÁìÊǽµµ½ÒÔǰµÄ¹Ì¼þ°æ±¾¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/new-dell-bios-updates-cause-laptops-and-desktops-not-to-boot/