MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ
Ðû²¼Ê±¼ä 2021-10-28EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷
Çå¾²¹«Ë¾EmsisoftÔÚ10ÔÂ24ÈÕ¹ûÕæÁËÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷¡£¡£½ñÄêÔçЩʱ¼ä£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷BlackMatterÖб£´æÒ»¸ö¿ÉÓÃÓÚ»Ö¸´¼ÓÃÜÎļþÎó²î£¬£¬£¬£¬£¬²¢ÇÒËûÃÇÔÚ֮ǰһֱûÓÐ͸¶¸ÃÎó²îµÄ±£´æ£¬£¬£¬£¬£¬ÒÔ±ÜÃâ¸ÃÍÅ»ïÐÞ¸´Îó²î¡£¡£²»ÐÒµÄÊÇ£¬£¬£¬£¬£¬BlackMatterÔÚ9ÔÂβ·¢Ã÷²¢ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬Òò´ËÕâ¸ö½âÃÜÆ÷½öÄܽâÃÜ2021Äê7ÔÂÖÐÑ®ÖÁ9ÔÂÏÂѮ֮¼ä±»¼ÓÃܵÄÎļþ¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123736/security/blackmatter-decryptor-pat-victims.html
DiscourseÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-41163
DiscourseÔÚ10ÔÂ21ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-41163¡£¡£DiscourseÊÇ¿ªÔ´µÄÂÛ̳ÌÖÂÛÆ½Ì¨£¬£¬£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ10£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆµÄÇëÇóÀ´Ô¶³ÌÖ´ÐдúÂë¡£¡£Îó²îÊÇÓÉÓÚsubscribe_urlֵȱ·¦ÑéÖ¤µ¼Öµģ¬£¬£¬£¬£¬ÏÖÔÚÒÑÐû²¼²¹¶¡£¡£»£»ÈôÊDz»×°Öò¹¶¡£¬£¬£¬£¬£¬¿ÉÒÔͨ¹ýÔÚÉÏÓÎÊðÀí×èÖ¹ÒÔ/webhooks/aws¿ªÍ·µÄ·¾¶µÄÇëÇóÀ´»º½âÎó²î¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/10/24/critical-rce-vulnerability-discourse
Ñо¿Ö°Ô±ÔÚº«¹ú·¢Ã÷ͨ¹ýÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬ASECµÄÑо¿Ö°Ô±·¢Ã÷Õë¶Ôº«¹úʹÓÃÍøÂçÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯¡£¡£¹¥»÷ÕßÊ×ÏȽ«njRATºÍUDP RATµÈ¶ñÒâÈí¼þ·â×°ÔÚÒ»¸öÓÎÏ·°üÖУ¬£¬£¬£¬£¬È»ºó½«ËüÃÇÉÏ´«µ½º«¹úµÄÔÚÏߴ洢ЧÀÍwebhardsÖС£¡£Ä¿µÄÏÂÔØ²¢½âѹZIPÃûÌõÄÓÎÏ·ºó»á»ñµÃÒ»¸ögame.exe£¬£¬£¬£¬£¬ÔËÐиÃÎļþÖ®ºó»á×°ÖÃÒ»¸öRAT²¢´æÈëλÓÚC:\ProgramFiles\4.0389µÄÎļþ¼ÐÖУ¬£¬£¬£¬£¬Í¬Ê±»¹»á½¨ÉèÒ»¸öеÄGame.exeÀ´ÔËÐÐÓÎÏ·¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/rat-malware-spreading-in-korea-through-webhards-and-torrents/
¹¥»÷ÍÅ»ïʹÓüƷÑÓ¦ÓÃBillQuick·Ö·¢ÀÕË÷Èí¼þ
Huntress ThreatOpsÍŶӷ¢Ã÷¼ÆÊ±¼Æ·ÑÓ¦ÓÃBillQuick±£´æSQL×¢ÈëÎó²îCVE-2021-42258¡£¡£¿£¿£¿£¿£¿£¿ÉÒÔͨ¹ýÔÚÓû§Ãû×Ö¶ÎÖÐʹÓÃÎÞЧ×Ö·û£¨µ¥ÒýºÅ£©µÇ¼ÇëÇóÀ´´¥·¢¸ÃÎó²î£¬£¬£¬£¬£¬²¢Ô¶³ÌÖ´ÐдúÂë¡£¡£Ñо¿ÍŶӳƣ¬£¬£¬£¬£¬ËûÃÇÔÚ2021Äê10ÔÂ8ÈÕÖÁ10ÈÕ·¢Ã÷ÁËʹÓøÃÎó²î·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄÍÅ»ïÉв»Ã÷È·£¬£¬£¬£¬£¬µ«ÀÕË÷Èí¼þ×Ô2020Äê5ÔÂÒÔÀ´¾ÍÒ»Ö±ÔÚʹÓᣡ£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÓÚ10ÔÂ7ÈÕÐÞ¸´£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±»¹·¢Ã÷ÁËBillQuickÖÐµÄÆäËû8¸ö0 day¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/10/hackers-exploited-popular-billquick.html
MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ
MicrosoftÍþвÇ鱨ÖÐÐÄÔÚ10ÔÂ25ÈÕÐû²¼Á˹ØÓÚNOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£NOBELIUMÊÇ2020Äê12ÔÂÕë¶ÔSolarWindsµÄ¹©Ó¦Á´¹¥»÷µÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬×Ô2021Äê5ÔÂÒÔÀ´£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔÚÃÀ¹úºÍÅ·ÖÞÌᳫÁËÓÐÕë¶ÔÐԵũӦÁ´¹¥»÷¡£¡£´Ë´Î»î¶¯²¢Î´Ê¹ÓÃÈκÎÎó²î£¬£¬£¬£¬£¬¶øÊÇʹÓÃÃÜÂëÅçÉä¡¢ÁîÅÆÍµÇÔ¡¢APIÀÄÓúÍÓã²æÊ½ÍøÂç´¹ÂڵȶàÖÖÊÖÒÕÀ´ÇÔÌØÈ¨ÕÊ»§µÄƾ֤£¬£¬£¬£¬£¬´Ó¶øÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯¡£¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/
NeustarÐû²¼2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ
Neustar¹ú¼ÊÇ徲ίԱ»á(NISC)Ðû²¼ÁË2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬72%µÄ×éÖ¯ÔÚÒÑÍù12¸öÔÂÄÚÖÁÉÙÂÄÀú¹ýÒ»´ÎDNS¹¥»÷£¬£¬£¬£¬£¬ÆäÖÐ×î³£¼ûµÄDNS¹¥»÷ÀàÐÍDNSÐ®ÖÆ (47%)¡¢DNSºé·º·´Éä»ò·Å´ó¹¥»÷µÈDDoS¹¥»÷(46%)¡¢DNSËíµÀ(35%)»ººÍ´æÖж¾(33%)¡£¡£2021Äê7ÔÂÖÁ8Ô£¬£¬£¬£¬£¬DDoSÊÇ×îÊܹØ×¢µÄÎÊÌ⣬£¬£¬£¬£¬Æä´ÎÊÇϵͳÈëÇÖºÍÀÕË÷Èí¼þ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.niscicb.com/LatestResults