±ÈÀûʱÄÚÕþ²¿³ÆÆäÔâµ½ÖØ´óµÄ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬£¬ÒÉËÆÊÇÌØ¹¤»î¶¯£»£»£»£»£»£» £»SentinelOne·¢Ã÷ÒÁÀÊAgriusÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-05-27

1.±ÈÀûʱÄÚÕþ²¿³ÆÆäÔâµ½ÖØ´óµÄ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬£¬ÒÉËÆÊÇÌØ¹¤»î¶¯


1.jpg


±ÈÀûʱÄÚÕþ²¿ÓÚ±¾Öܶþ³ÆÆäÔâµ½ÁËÖØ´óµÄ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬£¬ÒÉËÆÊÇÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬ £¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷×îÏÈÓÚ2019Ä꣬ £¬£¬£¬£¬£¬£¬£¬µ«Ö±µ½½ñÄê3Ô²ű»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£±ÈÀûʱÕþ¸®ÒѶԴËÊÂÕö¿ªÊӲ죬 £¬£¬£¬£¬£¬£¬£¬À´È·¶¨¹¥»÷µÄÆðÔ´¡¢ÊÜÓ°ÏìÊý¾ÝµÄ¹æÄ£ÒÔ¼°ÊÇ·ñÉæ¼°Íâ¹úÊÆÁ¦¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷µÄÄ¿µÄ²»ÊÇÖÐÖ¹ÍøÕ¾»òË÷ÒªÊê½ð£¬ £¬£¬£¬£¬£¬£¬£¬ËüÔ½·¢ÖØ´óÇÒÕë¶ÔÐÔÇ¿£¬ £¬£¬£¬£¬£¬£¬£¬Òò´ËÏÓÒÉÕâÊÇÒ»´ÎÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£½ñÄê5Ô³õ±ÈÀûʱ»¹Ôâµ½ÁËÁíÒ»´Î´ó¹æÄ£¹¥»÷µ¼ÖÂBelnetÍøÂçÖÐÖ¹£¬ £¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ùúµÄ½ÌÓý»ú¹¹¡¢´óѧ¡¢Ñо¿ÖÐÐĺ͹«¹²ÖÎÀí²¿·Ö¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118275/breaking-news/belgium-interior-ministry-cyber-attack.html


2.SentinelOne·¢Ã÷ÒÁÀÊAgriusÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯


2.jpg


SentinelLabsÑо¿Ö°Ô±·¢Ã÷ÒÁÀÊ´Ó2020Äê12ÔÂ×îÏȽ«ÒÔÉ«ÁÐ×÷Ϊ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£×î³õ£¬ £¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïʹÓÃÁË´ÅÅ̲Á³ýÆ÷DEADWOOD£¨ÓÖÃûDetbosit£©£¬ £¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÆÆËðÊÜѬȾÉè±¹ØÁ¬ÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬£¬Ö®ºóÓÖʹÓÃÁ˾ßÓÐÀÕË÷¹¦Ð§µÄApostle¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬ £¬£¬£¬£¬£¬£¬£¬Æä¼ÓÃܹ¦Ð§½öÊÇΪÁËÑÚÊÎÆäÏëÒªÏú»ÙÊܺ¦ÕßÊý¾ÝµÄÏÖʵÒâͼ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁ˶àÖÖ¹¥»÷ǰÑÔ£¬ £¬£¬£¬£¬£¬£¬£¬°üÀ¨SQL×¢Èë¡¢FortiOS CVE-2018-13379Îó²îÒÔ¼°ÖÖÖÖ1 dayÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/iranian-hacking-group-targets-israel-with-wiper-disguised-as-ransomware/


3.GoogleÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ChromeÖеÄ32¸öÎó²î


3.jpg


GoogleÓÚ±¾ÖܶþÐû²¼Chrome£¬ £¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´32¸öÎó²î¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇAutofillÖеĶѻº³åÇøÒç³öÎó²î£¬ £¬£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2021-30521¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËWebAudio¡¢WebRTC¡¢TabStrip¡¢TabGroups¡¢WebUIºÍWebAuthenticationÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2021-30522¡¢CVE-2021-30523¡¢CVE-2021-30524¡¢CVE-2021-30525¡¢CVE-2021-30527ºÍCVE-2021-30528£©£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°TabStripÖеÄÔ½½çд£¨CVE-2021-30526£©µÈÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-32-vulnerabilities-release-chrome-91


4.ÁìÍÁÇå¾²²¿½«Ðû²¼ÃÀ¹úµÚÒ»¸öÓйعܵÀÍøÂçÇå¾²µÄ¹æÔò


4.jpg


ÁìÍÁÇå¾²²¿£¨DHS£©½«Ðû²¼ÃÀ¹úµÚÒ»¸öÓйعܵÀÍøÂçÇå¾²µÄ¹æÔò¡£¡£¡£¡£¡£¡£¡£DHS³ÆÆäÔËÊäÇå¾²ÖÎÀí¾Ö½«ÔÚ±¾ÖÜÐû²¼Çå¾²Ö¸Á £¬£¬£¬£¬£¬£¬£¬ÒªÇó¹ÜµÀ¹«Ë¾ÏòÁª°îÕþ¸®±¨¸æÍøÂçÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬£¬²¢½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÖÜÄھ͹ܵÀ¹«Ë¾±£»£»£»£»£»£» £»¤ÆäϵͳµÄÒªÁìÒÔ¼°Ôâµ½¹¥»÷ʱӦ½ÓÄɵİ취£¬ £¬£¬£¬£¬£¬£¬£¬Öƶ©Ò»Ì׸üΪÍêÉÆµÄÇ¿ÖÆÐÔ¹æÔò¡£¡£¡£¡£¡£¡£¡£ÕâÐ©Ç¿ÖÆÐÔ¹æÔò½«È¡´úDHSÏÈǰÐû²¼µÄ×ÔÔ¸ÐÔÍøÂçÇå¾²Ö¸ÄÏ¡£¡£¡£¡£¡£¡£¡£²»¾ÃǰColonial PipelineÔâµ½ÀÕË÷Èí¼þ¹¥»÷ʹ¹ÜµÀ¹Ø±ÕÁË11Ì죬 £¬£¬£¬£¬£¬£¬£¬Õâµ¼ÖÂÃÀ¹ú¶«Äϲ¿µÄÆûÓÍǷȱÒÔ¼°¹«ÃñµÄ¿Ö»ÅÐÔ¹ºÖ㬠£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚÉÏÖÜÖ§¸¶ÁË440ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/us-to-regulate-pipeline/


5.Mandiant·¢Ã÷Õë¶Ô²Ù×÷ÊÖÒÕ£¨OT£©µÄ¹¥»÷ƵÂÊÖð½¥Ôö¸ß


5.jpg


FireEyeµÄMandiant·¢Ã÷Õë¶Ô²Ù×÷ÊÖÒÕ£¨OT£©µÄ¹¥»÷ƵÂÊÖð½¥Ôö¸ß¡£¡£¡£¡£¡£¡£¡£MandiantÌåÏÖÆä´Ó2012ÄêÆð¾Í×îÏÈ¼à¿ØÄÇЩÉù³Æ³öÊÛOTϵͳ»á¼ûȨµÄ¹¥»÷Õߣ¬ £¬£¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÔÚÒÑÍù¼¸ÄêÀ £¬£¬£¬£¬£¬£¬£¬´ËÀàÊÂÎñµÄƵÂʺÍÑÏÖØË®Æ½ÓÐ×ÅÏÔÖøÔöÌí¡£¡£¡£¡£¡£¡£¡£×î½ü£¬ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÓÖ·¢Ã÷Á˸ü¶àµÄ·ÇÖØ´óÐÔ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬£¬£¬£¬ËüÃÇʹÓó£¼ûµÄÕ½Êõ¡¢ÊÖÒպͳÌÐò(TTPs)ºÍÉÌÆ·¹¤¾ßÀ´»á¼û»òÍøÂçÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬£¬ÕâÔÚÒÑÍùÊǺÜÉÙ¼ûµÄ¡£¡£¡£¡£¡£¡£¡£Mandiant½¨ÒéÓ¦¾­³£¶ÔÍøÂç¾ÙÐÐÇ¿»¯£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâDZÔÚµÄÍþв¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/not-as-complex-as-we-thought-cyberattacks-on-operational-technology-are-on-the-rise/


6.FlashpointÐû²¼ÓйضíÂÞ˹°µÍøHydraµÄÆÊÎö±¨¸æ


6.jpg


FlashpointÐû²¼ÁËÓйضíÂÞ˹°µÍøHydraµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬£¬HydraµÄ»î¶¯×Ô½¨ÉèÒÔÀ´Ñ¸ËÙÔöÌí£¬ £¬£¬£¬£¬£¬£¬£¬ÄêÉúÒâ¶î´Ó2016ÄêµÄ940ÍòÃÀÔªÔöÌíµ½2020Äêµ×µÄ13.7ÒÚÃÀÔª£¬ £¬£¬£¬£¬£¬£¬£¬HydraÔÚ2018-2020ÄêµÄÈýÄêÖУ¬ £¬£¬£¬£¬£¬£¬£¬ÄêÔöÌíÂʸߴï624%¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬HydraÖÎÀíÔ±¶ÔÆäÂô¼ÒʵÑéÁËÑÏ¿áµÄ¿ØÖÆ£ºÊ×ÏÈ£¬ £¬£¬£¬£¬£¬£¬£¬Õ¥È¡Âô·½ÔÚHydraÉϾÙÐÐÌá¿î£¬ £¬£¬£¬£¬£¬£¬£¬³ý·ÇÆäµÖ´ï×îµÍÏ޶£»£»£»£»£» £»Æä´Î£¬ £¬£¬£¬£¬£¬£¬£¬Âô¼ÒÔÚÌá¿îʱ±ØÐèÊ×ÏȽ«HydraÉϵÄÊÕÒæ×ª»»Îª¶íÂÞ˹µÄ·¨¶¨Ç®±Ò¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.flashpoint-intel.com/blog/chainalysis-hydra-cryptocurrency-research/