Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
Ðû²¼Ê±¼ä 2022-04-06Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
3ÔÂ30ÈÕ£¬£¬£¬£¬£¬FortinetÐû²¼±¨¸æ³ÆÆä¼ì²âµ½APT×éÖ¯Deep PandaµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¸ÃÍÅ»ïʹÓÃLog4ShellÎó²î¹¥»÷VMware HorizonЧÀÍÆ÷£¬£¬£¬£¬£¬×îÖÕÖ¼ÔÚ×°ÖÃÒ»¸öÃûΪFire ChiliµÄÐÂÐÍrootkit¡£¡£¡£¡£¡£¸ÃrootkitʹÓÃFrostburn Studios£¨ÓÎÏ·¿ª·¢ÉÌ£©ºÍComodo£¨Çå¾²Èí¼þ£©µÄÖ¤Êé¾ÙÐÐÊý×ÖÊðÃû£¬£¬£¬£¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£¡£ÊÓ²ìDeep Panda»î¶¯Ê±£¬£¬£¬£¬£¬Fortinet·¢Ã÷ÆäÓëWinntiÓÐÖØµþ¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶Ô½ðÈÚ¡¢Ñ§Êõ¡¢»¯×±Æ·ºÍÂÃÓÎÐÐÒµ¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits
Kaspersky³ÆLazarusʹÓÃľÂí»¯DeFi Wallet·Ö·¢ºóÃÅ
KasperskyÔÚ3ÔÂ31ÈÕÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬³¯ÏʺڿÍÍÅ»ïLazarusÕýÔÚʹÓÃľÂí»¯DeFiÓ¦Ó÷ַ¢ºóÃÅ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Ò»¸öľÂí»¯DeFi Wallet£¬£¬£¬£¬£¬±àÒëÈÕÆÚΪ2021Äê11Ô£¬£¬£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄϵͳÉÏ×°ÖÃÒ»¸ö¹¦Ð§ÆëÈ«µÄºóÃÅ£¬£¬£¬£¬£¬¸ÃºóÃÅαװ³ÉÁËGoogle Chromeä¯ÀÀÆ÷¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÓ¦Óõķַ¢ÒªÁ죬£¬£¬£¬£¬ÍƲâ¿ÉÄÜÊÇ´¹ÂÚÓʼþ»òͨ¹ýÉ罻ýÌå¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËλÓÚº«¹úµÄЧÀÍÆ÷ÓëºóÞÙÐÐͨѶ¡£¡£¡£¡£¡£
https://securelist.com/lazarus-trojanized-defi-app/106195/
INKYÔÚ½üÆÚ·¢Ã÷ÐÂÒ»ÂÖʹÓÃCalendlyµÄ´¹ÂÚ¹¥»÷»î¶¯
¾ÝýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬INKYÑо¿ÍŶӷ¢Ã÷ʹÓÃCalendlyµÄ´¹Âڻ¡£¡£¡£¡£¡£CalendlyÊÇÒ»¿îÊ¢ÐеÄÃâ·ÑÈÕÀúÓ¦Ó㬣¬£¬£¬£¬¼¯³ÉÁËZoom£¬£¬£¬£¬£¬¿ÉÓÃÓÚ°²ÅžۻáºÍÔ¼»á¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ2ÔÂ⣬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýCalendlyƽ̨ÌìÉú´¹ÂÚÓʼþ¡£¡£¡£¡£¡£Ê×ÏÈʹÓÃCalendlyÌí¼Ó×Ô½ç˵Á´½ÓµÄ¹¦Ð§²åÈë¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬¸ÃÁ´½ÓǶÈëÔÚÉó²éÎĵµ°´¼üÖУ¬£¬£¬£¬£¬Óû§µã»÷ºó»á±»Öض¨Ïòµ½´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬×îÖÕÇÔȡĿµÄµÄMicrosoftµÇ¼ƾ֤¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-microsoft-credentials-phishing/
PaloAlto Networks¶Ô¿Í»§ÌṩµÄÊÖÒÕÖ§³ÖÐÅÏ¢ÒâÍâй¶
ýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬PaloAlto Networks(PAN) Ö§³ÖϵͳÖÐÉèÖùýʧµ¼Ö¿ͻ§µÄÃô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¸ÃÎÊÌâÓÉPANµÄÒ»¸ö¿Í»§ÔÚ±¾Ô·¢Ã÷£¬£¬£¬£¬£¬Ëû³Æ¿ÉÒÔ¿´µ½Ô¼Äª1989¸ö²»ÊôÓÚËûÃǵÄ×éÖ¯µÄÊÖÒÕÖ§³ÖÊÂÎñ¼Í¼£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚɨ³ý¹ýʧµÄ·À»ðǽÈÕÖ¾¡¢ÉèÖÃת´¢ºÍÍøÂçÇå¾²×é(NSG)½á¹¹µÈ¡£¡£¡£¡£¡£PANÌåÏÖûÓÐÈκÎÊý¾Ý±»ÏÂÔØ£¬£¬£¬£¬£¬²¢ÌåÏÖ´Ë´Îй¶ÊÂÎñµÄ¹æÄ£½öÏÞÓÚһλ¿Í»§¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¸ÃÎÊÌâµÄÐÞ¸´Ô¼ÄªÐèÒª8Ììʱ¼ä¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/palo-alto-networks-error-exposed-customer-support-cases-attachments/
AquaÐû²¼Õë¶ÔJupyter NotebookµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ
Aqua SecurityÓÚ3ÔÂ29ÈÕÐû²¼ÁËÕë¶ÔJupyterµÄ»ùÓÚPythonµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Jupyter NotebookÊÇÊý¾ÝרҵְԱÓÃÀ´´¦Öóͷ£Êý¾Ý¡¢±àдºÍÖ´ÐдúÂëÒÔ¼°¿ÉÊÓ»¯Ð§¹ûµÄ¿ªÔ´WebÓ¦Óᣡ£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÉèÖùýʧµÄÓ¦Óûá¼ûЧÀÍÆ÷£¬£¬£¬£¬£¬ÏÂÔØÓÃÓÚ¹¥»÷µÄ¿âºÍ¹¤¾ß£¨ÀýÈç¼ÓÃܳÌÐò£©£¬£¬£¬£¬£¬È»ºóͨ¹ýÕ³ÌùPython´úÂë²¢Ö´Ðо籾ÊÖ¶¯½¨ÉèÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¿ÉÄÜÓë¶íÂÞ˹µÄºÚ¿ÍÍÅ»ïÓйء£¡£¡£¡£¡£
https://blog.aquasec.com/python-ransomware-jupyter-notebook
Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ
4ÔÂ1ÈÕ£¬£¬£¬£¬£¬Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪProcess ManagerµÄ¶ñÒâAPK¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬Ëü»áʹÓóÝÂÖÐÎͼ±êÒþ²ØÔÚAndroid×°±¸ÉÏ£¬£¬£¬£¬£¬Î±×°³Éϵͳ×é¼þ£¬£¬£¬£¬£¬²¢ÒªÇó»ñȡװ±¸µÄλÖᢷ¢ËͺÍÔĶÁÎı¾¡¢»á¼û´æ´¢¡¢Ê¹ÓÃÏà»úÕÕÏàÒÔ¼°Â¼ÖÆÒôƵµÈ18ÏîȨÏÞ¡£¡£¡£¡£¡£Ëü»¹»áÏÂÔØÆäËüµÄpayload£¬£¬£¬£¬£¬ÀýÈçRoz Dhan£¬£¬£¬£¬£¬¸ÃÌØ¹¤Èí¼þ¿ÉÄÜ»áͨ¹ý´ËÖÖ·½·¨£¬£¬£¬£¬£¬×¬È¡ÍƼöÓ¦ÓõÄÓ¶½ð¡£¡£¡£¡£¡£
https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
Çå¾²¹¤¾ß
Socid-Extractor
´ÓСÎÒ˽¼Ò×ÊÁÏÍøÒ³/API ÏìÓ¦ÖÐÌáÈ¡ÓйØÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬²¢½«ÆäÉúÑÄΪ»úе¿É¶ÁÃûÌᣡ£¡£¡£¡£
https://github.com/soxoj/socid-extractor
GitBleed Tools
ÓÃÓÚ´Ó¾µÏñ git ´æ´¢¿âÖÐÌáÈ¡Êý¾Ý¡£¡£¡£¡£¡£
https://github.com/nightwatchcybersecurity/gitbleed_tools
ggshield
ÊÇÒ»¸ö CLI Ó¦ÓóÌÐò£¬£¬£¬£¬£¬¼ì²âÔ´´úÂëÖеÄÃÜÂë¡£¡£¡£¡£¡£
https://github.com/GitGuardian/ggshield
PackMyPayload
ÓÃÓÚ½«payload´ò°üµ½×÷Ϊ´æµµ/ÈÝÆ÷µÄÊä³öÎļþÖС£¡£¡£¡£¡£
https://securityonline.info/packmypayload-packages-payloads-into-output-containers/
Çå¾²ÆÊÎö
ºÚ¿ÍÂÛ̳ÉϳöÊÛµÄРBlackGuard ÃÜÂëÇÔÈ¡¶ñÒâÈí¼þ
https://www.bleepingcomputer.com/news/security/new-blackguard-password-stealing-malware-sold-on-hacker-forums/
FORCEDENTRY£ºÉ³ºÐÌÓÒÝ
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html
Microsoft Build ½«ÓÚ 5 Ô 24 ÈÕÆô¶¯
https://news.softpedia.com/news/microsoft-build-will-kick-off-on-may-24-535139.shtml
Atento³ÆÈ¥ÄêµÄLockBitÀÕË÷¹¥»÷Ôì³É4200ÍòÃÀÔªËðʧ
https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/
Anonymous¹¥»÷¶íÂÞ˹Ͷ×ʹ«Ë¾Thozis Corp
https://securityaffairs.co/wordpress/129651/hacktivism/anonymous-hacked-thozis-corp.html
ÍøÂç´¹ÂÚʹÓà Azure ¾²Ì¬ÍøÒ³Ã°³ä΢Èí
https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-web-pages-to-impersonate-microsoft/