µ¤ÂóÖÐÑëÒøÐÐºÍÆäËü7¼Ò˽ÈËÒøÐеÄÍøÕ¾Ôâµ½DDoS¹¥»÷

Ðû²¼Ê±¼ä 2023-01-12
1¡¢µ¤ÂóÖÐÑëÒøÐÐºÍÆäËü7¼Ò˽ÈËÒøÐеÄÍøÕ¾Ôâµ½DDoS¹¥»÷

      

·͸Éç1ÔÂ11ÈÕ±¨µÀ £¬£¬µ¤ÂóÖÐÑëÒøÐкÍΪ½ðÈÚÐÐÒµ¿ª·¢IT½â¾ö¼Æ»®µÄ¹«Ë¾BankdataµÄÍøÕ¾Ôâµ½DDoS¹¥»÷¡£¡£¡£ÑëÐн²»°ÈËÌåÏÖ £¬£¬ÆäÍøÕ¾ÔÚÖܶþÏÂÖçÕý³£ÔËÐÐ £¬£¬´Ë´Î¹¥»÷²¢Î´Ó°Ïì¸ÃÒøÐÐµÄÆäËüϵͳ»òÒ»Ñùƽ³£ÔËÓª¡£¡£¡£±ðµÄ £¬£¬ÔÚBankdataÔâµ½DDoS¹¥»÷ºó £¬£¬ÆäËü7¼Ò˽ÈËÒøÐÐÍøÕ¾µÄ»á¼ûÔÚÖܶþÒ²Êܵ½ÁËÏÞÖÆ £¬£¬ÆäÖаüÀ¨µ¤Âó×î´óµÄÁ½¼ÒÒøÐÐJyske Bank(JYSK.CO)ºÍSydbank(SYDB.CO)¡£¡£¡£


https://www.reuters.com/technology/denmarks-central-bank-website-hit-by-cyberattack-2023-01-10/


2¡¢ESET·¢Ã÷StrongPityÍÅ»ï·Ö·¢Ä¾Âí»¯TelegramµÄ»î¶¯

      

1ÔÂ10ÈÕ £¬£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯StrongPityµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¸Ã»î¶¯×Ô2021Äê11ÔÂ×îÏÈ»îÔ¾ £¬£¬Í¨¹ýÒ»¸öð³äShagleµÄÍøÕ¾·Ö·¢¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£ShagleÊÇÒ»¸öÕýµ±µÄËæ»úÊÓÆµÌ¸ÌìÆ½Ì¨ £¬£¬µ«Ëü²¢Ã»ÓÐÒÆ¶¯Ó¦ÓóÌÐò¡£¡£¡£¶ñÒâÓ¦ÓÃÊÇÒ»¸öÃûΪvideo.apkµÄAPKÎļþ £¬£¬ÕâÊÇÕýµ±TelegramÓ¦ÓõÄľÂí»¯°æ±¾ £¬£¬Ê¹ÓÃÁËStrongPityºóÃÅ´úÂëÖØÐ´ò°üÀ´Ã°³äShagleÒÆ¶¯Ó¦Óᣡ£¡£×°ÖÃºó £¬£¬´ËÓ¦ÓÿɾÙÐжàÖÖÌØ¹¤»î¶¯ £¬£¬°üÀ¨¼à¿Øµç»°¡¢ÍøÂç¶ÌÐźͻñÈ¡ÁªÏµÈËÁбí¡£¡£¡£


https://www.welivesecurity.com/2023/01/10/strongpity-espionage-campaign-targeting-android-users/


3¡¢ÐµÄDark PinkÍÅ»ïʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¹¥»÷¾üÕþ×éÖ¯

      

Group-IBÓÚ1ÔÂ11ÈÕÅû¶ÁËеÄAPT×éÖ¯Dark PinkÕë¶ÔÑÇÌ«ºÍÅ·ÖÞµØÇøµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚÓã²æÊ½´¹ÂÚÓʼþ £¬£¬ÆäʹÓõÄ×Ô½ç˵¹¤¾ß°ü¿ÉÓÃÓÚÇÔÊØÐÅÏ¢²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¹¥»÷Õß»¹Í¨¹ýDLL²à¼ÓÔØºÍÊÂÎñ´¥·¢µÄÒªÁì £¬£¬ÔÚ±»Ñ¬È¾µÄϵͳÉÏÔËÐÐÆäpayload¡£¡£¡£´Ë´Î¹¥»÷µÄ½¹µãÊÇÌØ¹¤»î¶¯ £¬£¬Ö¼ÔÚ´ÓÄ¿µÄµÄ×°±¸ºÍÍøÂçÖÐÇÔÈ¡Îļþ¡¢Âó¿Ë·çÒôƵºÍmessengerÊý¾Ý¡£¡£¡£Group-IB³Æ¸ÃÍÅ»ïÔÚ2022Äê6ÔÂ12ÔÂÒÑÌᳫÖÁÉÙ7´ÎÀֳɵĹ¥»÷¡£¡£¡£


https://www.group-ib.com/media-center/press-releases/dark-pink-apt/


4¡¢Áè¼Ý1300¸öÓòð³äAnyDeskÍøÕ¾·Ö·¢Vidar Stealer

      

¾ÝýÌå1ÔÂ10ÈÕ±¨µÀ £¬£¬Ò»³¡Ê¹ÓÃÁË1300¶à¸öÓòð³äAnyDesk¹Ù·½ÍøÕ¾µÄ´ó¹æÄ £»£»£»£»£»£»î¶¯ÕýÔÚ¾ÙÐÐÖС£¡£¡£ÕâЩÓò¶¼½«Óû§Öض¨Ïòµ½Í³Ò»¸öDropboxÁ´½Ó £¬£¬Ö¼ÔÚÏÂÔØVidar stealer £¬£¬ÇÒËùÓÐÓò¶¼ÆÊÎöΪÏàͬµÄIPµØµã185.149.120[.]9¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬´ó´ó¶¼ÓòÈÔÈ»ÔÚÏß £¬£¬¶øÆäËüÓòÒѱ»×¢²áÉ̱¨¸æ²¢ÏÂÏß»ò±»AV¹¤¾ß×èÖ¹¡£¡£¡£ÓÉÓÚAnyDeskµÄÊ¢ÐÐÐÔ £¬£¬Æä¾­³£±»ÀÄÓÃÀ´·Ö·¢¶ñÒâÈí¼þ £¬£¬CybleÔÚ2022Äê10ÔÂÒ²Ôø·¢Ã÷ͨ¹ýAnyDesk´¹ÂÚÍøÕ¾·Ö·¢Mitsu StealerµÄ»î¶¯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-1-300-fake-anydesk-sites-push-vidar-info-stealing-malware/


5¡¢UptycsÅû¶Õë¶ÔÒâ´óÀûµÄInfostealer¶ñÒâÈí¼þ»î¶¯

      

UptycsÔÚ1ÔÂ6ÈÕÐû²¼ÁËÕë¶ÔÒâ´óÀûµÄInfostealer¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¹¥»÷»î¶¯µÄ¶à½×¶ÎѬȾÁ´´ÓÒÔ·¢Æ±ÎªÖ÷ÌâµÄ´¹ÂÚÓʼþ×îÏÈ £¬£¬ÆäÖаüÀ¨Ò»¸öÁ´½Ó £¬£¬µã»÷Á´½Ó»áÏÂÔØÒ»¸öÊÜÃÜÂë± £»£»£»£»£»£»¤µÄZIP´æµµÎļþ £¬£¬ÆäÖаüÀ¨Ò»¸ö.LNKÎļþºÍÒ»¸ö.BATÎļþ¡£¡£¡£Åú´¦Öóͷ£¾ç±¾»á´ÓGitHub´æ´¢¿âÖÐ×°ÖöñÒâÈí¼þpayload¡£¡£¡£×°ÖÃºó £¬£¬»ùÓÚC#µÄ¶ñÒâÈí¼þ»áÇÔȡϵͳÐÅÏ¢¡¢¼ÓÃÜÇ®°ü¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢cookieÒÔ¼°¼ÓÃÜÇ®°üµÄƾ֤µÈ¡£¡£¡£


https://www.uptycs.com/blog/infostealer-malware-attacks-targeting-italian-region/


6¡¢CiscoÌáÐѿͻ§×¢ÖØEoL·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î

      

1ÔÂ11ÈÕ £¬£¬CiscoÐû²¼Ç徲ͨ¸æÌáÐѿͻ§×¢ÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2023-20025£©¡£¡£¡£¸ÃÎó²î»áÓ°Ïì¶à¸öÒÑÖÐÖ¹Ö§³Ö(EoL)µÄVPN·ÓÉÆ÷ £¬£¬°üÀ¨Cisco Small Business RV016¡¢RV042¡¢RV042GºÍRV082·ÓÉÆ÷¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î¿É»ñµÃroot»á¼ûȨÏÞ £¬£¬½«ÆäÓëÁíÒ»¸öÎó²î£¨CVE-2023-2002£©Á¬ÏµÊ¹ÓÿÉÔڵײã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ÏÖÔÚÒÑÔÚÒ°Íâ·¢Ã÷¿ÉÓõĿ´·¨ÑéÖ¤Îó²îʹÓôúÂë £¬£¬ÖÎÀíÔ±¿ÉÒÔͨ¹ý½ûÓÃÔ¶³ÌÖÎÀí²¢×èÖ¹¶Ô¶Ë¿Ú443ºÍ60443µÄ»á¼ûÀ´»º½âÎó²î¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-of-auth-bypass-bug-with-public-exploit-in-eol-routers/