SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247

Ðû²¼Ê±¼ä 2022-01-26

SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬ £¬£¬SolarWindsÐÞ¸´ÁËServ-UÖÐÒѱ»ÔÚҰʹÓõÄÊäÈëÑéÖ¤Îó²î¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-35247£¬ £¬£¬ÓÉ΢ÈíÑо¿Ö°Ô±Jonathan Bar OrÔÚ¼à¿ØÊ¹ÓÃLog4j¿âÖеÄÎó²î¾ÙÐеĹ¥»÷ʱ·¢Ã÷¡£¡£¿£¿£¿£¿É±»ÓÃÀ´ÔÚ¸ø¶¨Ò»Ð©ÊäÈëµÄÇéÐÎϹ¹½¨Ò»¸öÅÌÎÊ£¬ £¬£¬²¢ÔÚδ¾­´¦Öóͷ£µÄÇéÐÎÏÂͨ¹ýÍøÂç·¢Ë͸ÃÅÌÎÊ¡£¡£SolarWindsͨ¸æ³Æ£¬ £¬£¬LDAPÈÏÖ¤µÄServ-U webµÇ¼½çÃæÔÊÐí½ÓÊÜûÓгä·Ö¹ýÂ˵Ä×Ö·û£¬ £¬£¬¸ÃÎÊÌâÔÚServ-U 15.3Öнâ¾ö¡£¡£


https://securityaffairs.co/wordpress/126933/security/solarwinds-serv-u-flaw.html



ASEC·¢Ã÷ͨ¹ýº«¹úWebHardƽ̨Èö²¥µÄDDoS IRC Bot


AhnLabÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ(ASEC)ÔÚ1ÔÂ19ÈÕÐû²¼µÄ±¨¸æÖÐÌåÏÖ£¬ £¬£¬DDoS IRC BotÕýͨ¹ýº«¹úWebHardƽ̨Èö²¥¡£¡£»£»£»£»î¶¯½«´øÓжñÒâÈí¼þµÄÓÎÏ·ÒÔZIPÎļþµÄÐÎʽÉÏ´«µ½ÍøÂçÓ²ÅÌ£¬ £¬£¬¸ÃÎļþÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ£¨¡°Game_Open.exe¡±£©£¬ £¬£¬Ëü³ýÁË¿ÉÒÔÆô¶¯ÓÎÏ·Í⣬ £¬£¬»¹»áÔËÐжñÒâÈí¼þpayload¡£¡£¶ñÒâÈí¼þÊÇ»ùÓÚGoLangµÄDDoS IRC Bot£¬ £¬£¬±»ÓÃÓÚÌᳫÕë¶Ôº«¹úµÄDDoS¹¥»÷¡£¡£


https://thehackernews.com/2022/01/ddos-irc-bot-malware-spreading-through.html



ÓªÏú¹«Ë¾RR Donnelly³ÆÆäÔâµ½ContiµÄÀÕË÷¹¥»÷


ýÌå1ÔÂ19ÈÕ±¨µÀ£¬ £¬£¬ÓªÏú¹«Ë¾RR Donnelly(RRD)ÈÏ¿ÉÆäÔâµ½¹¥»÷¡£¡£12ÔÂ27ÈÕ£¬ £¬£¬RRDÏòSECÌá½»8-K±í¸ñ³ÆËûÃǵÄϵͳÔâµ½ÈëÇÖ£¬ £¬£¬ÆäÒѹرÕϵͳ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£1ÔÂ15ÈÕ£¬ £¬£¬ContiÍÅ»ïÉù³Æ¶Ô´ËÈÏÕæ£¬ £¬£¬²¢ÒÑ´ÓRRDÇÔÈ¡ÁË2.5GBÊý¾Ý¡£¡£¾ÝϤ£¬ £¬£¬ContiÔÚÓëRRD¾ÙÐÐ̸Åкó£¬ £¬£¬Òѽ«ÕâЩÊý¾Ýɾ³ý¡£¡£1ÔÂ18ÈÕ£¬ £¬£¬RRDÓÖÐû²¼ÁËÒ»·Ý8-KÎļþ£¬ £¬£¬ÈÏ¿ÉÆäÊý¾ÝÒÑÔÚ¹¥»÷ʱ´ú±»µÁ¡£¡£


https://www.bleepingcomputer.com/news/security/marketing-giant-rrd-confirms-data-theft-in-conti-ransomware-attack/



ÁÔÓ¥Ðж¯IIÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬ £¬£¬¹ú¼ÊÐ̾¯×é֯Эµ÷µÄÁÔÓ¥Ðж¯IIÒÑÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±¡£¡£´Ë´ÎÖ´·¨»î¶¯¿ªÕ¹ÓÚ2021Äê12ÔÂ12ÈÕÖÁ22ÈÕ£¬ £¬£¬ÊÇ2020ÄêÁÔÓ¥Ðж¯IÖ®ºó¶ÔÌØ¶¨×éÖ¯µÄµÚ¶þ´Î¹¥»÷¡£¡£¹ú¼ÊÐ̾¯×éÖ¯µÄͨ¸æ³Æ£¬ £¬£¬±»²¶µÄÏÓÒÉÈË¿ÉÄÜÒѹ¥»÷50000¶à¸öÄ¿µÄ£¬ £¬£¬ÆäÖÐÒ»È˵ÄÌõ¼Ç±¾ÉÏÓÐÁè¼Ý800000¸öDZÔÚÄ¿µÄÓòµÄƾ֤¡£¡£¸Ã»ú¹¹ÒÔΪ£¬ £¬£¬²¿·Ö±»²¶ÕßÊôÓÚBECÍÅ»ïSilverTerrier£¨ÓÖÃûTMT£©¡£¡£


https://unit42.paloaltonetworks.com/operation-falcon-ii-silverterrier-nigerian-bec/



Ñо¿ÍŶÓÔÚÒ°·¢Ã÷Õë¶Ô¼ÓÃÜÇ®±ÒµÄжñÒâÈí¼þBHUNT


BitdefenderÓÚ1ÔÂ19ÈÕÐû²¼±¨¸æ£¬ £¬£¬Åû¶Ð¶ñÒâÈí¼þBHUNTµÄϸ½Ú¡£¡£BHUNTÊÇÒ»¸öÓÃ.NET ±àдµÄÄ£¿£¿£¿£¿é»¯ÇÔÈ¡³ÌÐò£¬ £¬£¬Äܹ»ÇÔÈ¡¼ÓÃÜÇ®°ü£¨Exodus¡¢Electrum¡¢Atomic¡¢JaxxºÍEthereumµÈ£©ÖеÄÄÚÈÝ¡¢´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂëÒÔ¼°´Ó¼ôÌù°åÖв¶»ñµÄÃÜÂë¡£¡£´Ë´Î»î¶¯Éæ¼°°Ä´óÀûÑÇ¡¢°£¼°¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÈÕ±¾¡¢ÂíÀ´Î÷ÑÇ¡¢Å²Íþ¡¢ÐÂ¼ÓÆÂ¡¢ÄÏ·Ç¡¢Î÷°àÑÀºÍÃÀ¹ú£¬ £¬£¬¿ÉÄÜÊÇͨ¹ýÆÆ½âÈí¼þ×°ÖóÌÐò¾ÙÐзַ¢¡£¡£


https://www.bitdefender.com/blog/labs/poking-holes-in-crypto-wallets-a-short-analysis-of-bhunt-stealer/



Crypto.com½ü500¸öÕË»§±»ºÚ£¬ £¬£¬Ôì³É3400ÍòÃÀÔªËðʧ


ýÌå1ÔÂ20Èճƣ¬ £¬£¬ÐÂ¼ÓÆÂCrypto.comÐû²¼µÄÉùÃ÷ÌåÏÖÆä483¸öÕË»§±»ºÚ£¬ £¬£¬Ôì³É3400ÍòÃÀÔªËðʧ¡£¡£×î³õ£¬ £¬£¬²¿·ÖÓû§±¨¸æÆäÕÊ»§±£´æ¿ÉÒÉÉúÒ⣬ £¬£¬Ö»¹ÜÊܵ½2FA±£»£»£»£»¤µ«ÈÔÓÐÊýǧÃÀÔªETH±»µÁ¡£¡£¸Ã¹«Ë¾ÓÚ1ÔÂ17ÈÕÊ״μì²âµ½¹¥»÷£¬ £¬£¬ÆäʱÉÙÊýÓû§µÄÕÊ»§Éϱ£´æÎ´¾­ÊÚȨµÄÌá¿î¡£¡£Ö®ºó¹«Ë¾ÔÝÍ£ÁËËùÓÐÌá¿îÉúÒ⣬ £¬£¬ÔÚ¾­ÓÉÇå¾²¼Ó¹Ìºó£¬ £¬£¬Ìá¿îЧÀÍÓÚ1ÔÂ18ÈÕÏÂÖç5:46×óÓÒ»Ö¸´¡£¡£Crypto.comÌåÏÖÒÑ×èÖ¹´ó²¿·Öδ¾­ÊÚȨµÄÌá¿î£¬ £¬£¬²¢½«ÎªÊÜÓ°Ïì¿Í»§È«¶î±¨Ïú¡£¡£


https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/



Çå¾²¹¤¾ß


Raven


ÊǼò»¯¡¢¿É¶¨ÖÆÇÒÏìӦѸËٵĸ߼¶ÍøÂçÍþвͼ¡£¡£


https://github.com/qeeqbox/raven


Espoofer


ÊÇÒ»ÖÖ¿ªÔ´²âÊÔ¹¤¾ß£¬ £¬£¬¿ÉÈÆ¹ýµç×ÓÓʼþϵͳÖÐµÄ SPF¡¢DKIM ºÍ DMARC Éí·ÝÑéÖ¤¡£¡£


https://github.com/chenjj/espoofer


pip-audit


ÊÇÒ»ÖÖÓÃÓÚɨÃè Python ÇéÐÎÒÔ²éÕÒ¾ßÓÐÒÑÖªÎó²îµÄ°üµÄ¹¤¾ß¡£¡£


https://github.com/trailofbits/pip-audit


Çå¾²ÆÊÎö


Õë¶ÔÎÚ¿ËÀ¼¹Ù·½ÍøÕ¾µÄ¶ñÒâÈí¼þWhisperGateÆÊÎö


1ÔÂ13ÈÕÎÚ¿ËÀ¼´ó×ڵĹٷ½ÍøÕ¾±»¹¥»÷£¬ £¬£¬ÎÄÕÂÆÊÎöÁ˸ÃÊÂÎñÖжñÒâÈí¼þ¡£¡£


https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3


2021 ÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö


´ÓÒ»Ö±Éú³¤µÄÀÕË÷Èí¼þÉú̬ϵͳµ½Õë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬ £¬£¬ÈüÃÅÌú¿Ë»ØÊ×ÁË 2021 ÄêµÄÍøÂçÇå¾²Ì¬ÊÆ¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021



Ó¢¹úNCSCÐû²¼×éÖ¯µÖÓùµç»°ºÍ¶ÌÐÅڲƭ»î¶¯µÄÖ¸ÄÏ


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC) Ðû²¼Á˵ÄÖ¸ÄÏÖ¼ÔÚ±£»£»£»£»¤¿Í»§ÃâÊÜڲƭ»î¶¯µÄ¹¥»÷£¬ £¬£¬Í¬Ê±È·±£ËûÃÇµÄ SMS ºÍµç»°ÐÂÎſɿ¿¡£¡£


https://securityaffairs.co/wordpress/126916/security/ncsc-guidance-communications-with-customers.html