¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190308
Ðû²¼Ê±¼ä 2019-03-08
ÔÎÄÁ´½Ó£º
https://securelist.com/financial-cyberthreats-in-2018/89788/2¡¢ÐÂÍøÂçÌØ¹¤×éÖ¯Whitefly£¬£¬£¬£¬£¬£¬£¬£¬ÓëÐÂ¼ÓÆÂ¶à¸ö¹¥»÷»î¶¯ÓйØ
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore3¡¢Ñо¿ÍŶӷ¢Ã÷2Ô·ÝÀÕË÷Èí¼þShadeµÄ¹¥»÷»î¶¯ìÉý
Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷ÀÕË÷Èí¼þTroldesh£¨ÓÖÃûShade£©ÔÚ2018ÄêQ4µ½2019ÄêQ1ʱ´úµÄ¼ì²âÊýÄ¿¼±¾çÔöÌí¡£¡£¡£¡£¡£¡£Shadeͨ³£Í¨¹ý´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬£¬£¬Æä¸½¼þÊǰüÀ¨Javascript¾ç±¾µÄzipÎļþ¡£¡£¡£¡£¡£¡£ShadeµÄÖ÷Òª¹¥»÷Ä¿µÄÊÇWindowsϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Æä½ÓÄÉAES 256 CBCËã·¨¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£²¿·ÖShadeµÄ±äÖÖ±£´æÃâ·ÑµÄ½âÃܹ¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬Óû§¿ÉÔÚNoMoreRansom.orgÍøÕ¾ÉÏÕÒµ½ËüÃÇ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/4¡¢Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack API¾ÙÐÐͨѶµÄSLUBºóÃÅ
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack APIͨѶµÄ¶ñÒâÈí¼þSLUBºóÃÅ¡£¡£¡£¡£¡£¡£SLUBÊÇÒ»¸öÓÃC++±àдµÄ×Ô½ç˵ºóÃÅ£¬£¬£¬£¬£¬£¬£¬£¬Æä°üÀ¨¾²Ì¬Á´½Ó¿âcurl£¨ÓÃÓÚÖ´ÐÐHTTPÇëÇ󣩡¢boost£¨ÓÃÓÚ´ÓgistƬ¶ÏÖÐÌáÈ¡ÏÂÁºÍJsonCpp£¨ÓÃÓÚÆÊÎöslackͨѶ£©¡£¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýË®¿Ó¹¥»÷Èö²¥£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒʹÓÃÁË΢ÈíÔÚ2018Äê5ÔÂÐÞ¸´µÄVBScriptÒýÇæÎó²î£¨CVE-2018-8174£©¾ÙÐÐѬȾ¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ»¹»á´ÓGithubÉÏÏÂÔØÒ»¸öÌØ¶¨µÄgistƬ¶Ï²¢ÌáÈ¡Ïà¹ØÏÂÁî¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/5¡¢ÐÂľÂíPirate Matryoshka£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óú£µÁÍå¾ÙÐзַ¢

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷¹¥»÷ÕßʹÓú£µÁÍå·Ö·¢ÐÂľÂíPirate Matryoshka¡£¡£¡£¡£¡£¡£¸ÃľÂíαװ³ÉÆÆ½âÈí¼þµÄ×°ÖÃÎļþ£¬£¬£¬£¬£¬£¬£¬£¬µ±Óû§ÔËÐиÃÎļþʱ£¬£¬£¬£¬£¬£¬£¬£¬½«»áÏÔʾһ¸öαÔìµÄº£µÁÍåµÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÕË»§ÃûºÍÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߾ͻáÐ®ÖÆÓû§µÄÕË»§²¢ÉÏ´«¸ü¶àµÄ¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬×°ÖÃÎļþ»¹Ä¬ÈÏÀ¦°óÁËÆäËüÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÎå·ÖÖ®Ò»ÊÇ¹ã¸æÈí¼þ¡¢Ð®ÖÆä¯ÀÀÆ÷Ö÷Ò³µÄ¶ñÒâÈí¼þÒÔ¼°Ä¾ÂíµÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.kaspersky.com/blog/pirate-matryoshka-malware/25905/6¡¢Ë¼¿ÆÐÞ¸´Nexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î
˼¿Æ±¾ÖÜÐÞ¸´ÁËNexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨DoS¡¢í§Òâ´úÂëÖ´ÐкÍȨÏÞÌáÉýµÈ¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËTetration AnalyticsÊðÀí¡¢LDAP¡¢Óû§ÕÊ»§ÖÎÀí½çÃæ¡¢ÏÂÁîÐнçÃæ£¨CLI£©µÈ×é¼þ£¬£¬£¬£¬£¬£¬£¬£¬¶à¸öÎó²î¿ÉÔÊÐíÍâµØ¹¥»÷Õß¾ÙÐÐÌáȨ¡¢ÒÔrootÉí·ÝÖ´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ¡¢»ñÈ¡Ö÷ÒªÉèÖÃÎļþµÄ»á¼ûȨÏÞ»ò¾ÙÐÐÊÜÏÞshellÌÓÒÝ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ»¹½¨ÒéÓû§½ÓÄɲ½·¥±£»£»£»£»£»£»¤°²ÅÅÁËPOAPµÄÍøÂç»ò½ûÓøù¦Ð§¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82120/breaking-news/cisco-nexus-flaws-2.htmlÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ