ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»£»£»NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶

Ðû²¼Ê±¼ä 2021-01-07

1.ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷


1.jpg


ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£ ¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£ ¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£ ¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


2.Intezer·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦ÓÃ


2.jpg


Intezer Labs·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Óᣠ¡£¡£¡£¡£¸Ã»î¶¯ÔçÔÚ2020Äê1ÔÂ8ÈÕ¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬¿ÉÊÇÔÚ2020Äê12Ô²ű»·¢Ã÷¡£ ¡£¡£¡£¡£ºÚ¿ÍÖ÷ÒªÒÀÀµÓÚÈý¸öÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄÓ¦ÓÃJamm¡¢eTrade/KintumºÍDaoPokerÀ´·Ö·¢¶ñÒâÈí¼þElectroRAT¡£ ¡£¡£¡£¡£ElectroRAT¾ßÓм«Ç¿µÄÇÖÈëÐÔ£¬£¬£¬£¬£¬£¬¾ßÓмüÅ̼ͼ¡¢½ØÍ¼¡¢ÉÏ´«Îļþ¡¢ÏÂÔØÎļþÒÔ¼°ÔÚÄ¿µÄ¿ØÖÆÌ¨ÉÏÖ´ÐÐÏÂÁîµÈ¹¦Ð§£¬£¬£¬£¬£¬£¬ÏÖÔÚ¿ÉÄÜÒѾ­Ñ¬È¾ÁËԼĪ6500¸öÓû§¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-target-cryptocurrency-users-with-new-electrorat-malware/


3.°ÄÕþ¸®ÖÒÑÔ·¸·¨ÍÅ»ïð³äÆäÍøÂçÇå¾²ÖÐÐÄ·Ö·¢¶ñÒâÈí¼þ


3.png


°Ä´óÀûÑÇÕþ¸®ÖÒÑԳƣ¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïð³ä°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©·Ö·¢¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¸ÃÍÅ»ïÓÕʹÊܺ¦Õß×°ÖÃÔ¶³ÌÖÎÀíºÍ×ÀÃæ¹²ÏíÈí¼þ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÓû§µÄÒøÐÐÐÅÏ¢¡£ ¡£¡£¡£¡£ÆäÊ×ÏÈʹÓÃαװ³ÉACSC¹Ù·½ÐÂÎŵĵç×ÓÓʼþ£¬£¬£¬£¬£¬£¬¼û¸æÊܺ¦ÕßµçÄÔÒѾ­±»ÈëÇÖ£¬£¬£¬£¬£¬£¬ÐèҪͨ¹ý¶ñÒâÁ´½ÓÏÂÔØ¼ÙµÄɱ¶¾Èí¼þ¡£ ¡£¡£¡£¡£Ò»µ©Óû§ÏÂÔØ²¢Æô¶¯ºó£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í¿ÉÄܽÓÊÜÆäÅÌËã»ú²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ ¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬¸ÃÍŻﻹ»áʹÓÃαÔìµÄµç»°ºÅÂë¸øÊܺ¦Õß´òµç»°£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇÏÂÔØTeamViewer»òAnyDeskÓ¦Ó㬣¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/australian-cybersecurity-agency-used-as-cover-in-malware-campaign/


4.Check PointÐû²¼Õë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ


4.png


Check PointÐû²¼ÁËÕë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬×Ô2020Äê11ÔÂ1ÈÕÒÔÀ´È«ÇòÕë¶ÔÒ½ÁÆÐÐÒµµÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÁè¼Ý45£¥£¬£¬£¬£¬£¬£¬¶øÕë¶ÔÆäËûÐÐÒµµÄ¹¥»÷ƽ¾ùÔöÌíÁË22£¥£»£»£»£»£»£»£»ÔÚ11ÔÂÿ¸ö×é֯ƽ¾ùÿÖÜÔâµ½626´Î¹¥»÷£»£»£»£»£»£»£»Éæ¼°µ½ÀÕË÷Èí¼þ¡¢½©Ê¬ÍøÂç¡¢Ô¶³Ì´úÂëÖ´ÐкÍDDoSµÄ¹¥»÷ÔÚ11Ô·ݶ¼ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷µÄÔöÌí×îΪÏÔ×Å£»£»£»£»£»£»£»¹¥»÷ÖÐʹÓõÄÖ÷ÒªÀÕË÷Èí¼þÊÇRyuk£¬£¬£¬£¬£¬£¬Æä´ÎÊÇSodinokibi¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/05/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again/


5.ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý²¢³ÆÓû³öÊÛ¸ü¶à


5.png


ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬£¬²¢³ÆÓû³öÊÛ¸ü¶àExpress¡¢SantanderºÍBanamexÒøÐпͻ§µÄÐÅÓÿ¨ÐÅÏ¢¡£ ¡£¡£¡£¡£´Ë´Îй¶µÄ10000Ìõ¼Í¼°üÀ¨ÍêÕûµÄÃÀ¹úExpressÐÅÓÿ¨ºÅºÍ¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÐԱ𣬣¬£¬£¬£¬£¬¿ÉÊDz¢Ã»ÓÐÐÅÓÿ¨µÄµ½ÆÚÈÕÆÚ¡¢ÃÜÂë»òÃô¸ÐµÄ²ÆÎñÊý¾Ý¡£ ¡£¡£¡£¡£Âô·½ÌåÏÖ²¢²»³öÊÛÃÜÂëºÍÉí·ÝÖ¤ºÅµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý½ö»á±»ÓÃÓÚÀ¬»øÓʼþ»òÓªÏú¹ã¸æ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-posts-data-of-10-000-american-express-accounts-for-free/


6.NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶


6.png


NISSAN±±ÃÀ·Ö¹«Ë¾ÒòÔÚBitbucket GitЧÀÍÆ÷ÖÐʹÓÃÁËĬÈÏÆ¾Ö¤admin/admin£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÒÆ¶¯Ó¦ÓóÌÐòºÍÄÚ²¿¹¤¾ßµÄÔ´´úÂëй¶¡£ ¡£¡£¡£¡£´Ë´Îй¶µÄÔ´´úÂë°üÀ¨ÈÕ²úNA MobileÓ¦Óá¢ÈÕ²úASISTÕï¶Ï¹¤¾ßµÄijЩ²¿·Ö¡¢¾­ÏúÉÌӪҵϵͳ/¾­ÏúÉÌÃÅ»§¡¢ÈÕ²úÄÚ²¿½¹µãmobile library¡¢ÈÕ²ú/Ó¢·ÆÄáµÏNCAR/ICARЧÀÍ¡¢¿Í»§»ñÈ¡ºÍ±£´æ¹¤¾ß¡¢ÏúÊÛ/Êг¡Ñо¿¹¤¾ß+Êý¾Ý¡¢ÖÖÖÖÓªÏú¹¤¾ß¡¢³µÁ¾ÎïÁ÷ÃÅ»§¡¢³µÁ¾ÁªÍøÐ§ÀÍ/ÈÕ²úÁªÍø¡¢ÒÔ¼°ÆäËüÖÖÖÖºó¶ËºÍÄÚ²¿¹¤¾ßµÈ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nissan-source-code-leaked-online-after-git-repo-misconfiguration/