DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ

Ðû²¼Ê±¼ä 2021-11-24

RedCurlÍÅ»ï»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬ÐµĹ¥»÷Ä¿µÄÉæ¼°¸÷Ðи÷Òµ


RedCurlÍÅ»ï»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬ÐµĹ¥»÷Ä¿µÄÉæ¼°¸÷Ðи÷Òµ.png


Group-IBÔÚ11ÔÂ18ÈÕÅû¶Á˺ڿÍÍÅ»ïRedCurlµÄл¡£¡£¡£ÍøÂçÌØ¹¤ºÚ¿Í×éÖ¯RedCurlÔÚ2018ÄêÖÁ2020Äêʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬ÌᳫÁËÖÁÉÙ26´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ó¢¹ú¡¢µÂ¹ú¡¢¼ÓÄôó¡¢Å²Íþ¡¢¶íÂÞ˹ºÍÎÚ¿ËÀ¼µÈµØÇøµÄÐÞ½¨¡¢½ðÈÚ¡¢×Éѯ¡¢ÁãÊÛ¡¢°ü¹ÜºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¸ÃÍÅ»ïÔÚÖÐÖ¹7¸öÔºó¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬£¬£¬×Ô2021ÄêÍ·ÒÔÀ´Õë¶Ô4¼Ò¹«Ë¾ÌᳫÁËÐµĹ¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨¶íÂÞ˹×î´óµÄÅú·¢ÊÐËÁ¡£¡£¡£Group-IB³Æ£¬£¬£¬£¬£¬£¬£¬£¬RedCurlÔÚÿ´Î¹¥»÷Öж¼»áʹÓÃÆä×Ô½ç˵¶ñÒâÈí¼þÈÆ¹ý¼ì²â¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.group-ib.com/media/red-curl-threat-report/


Ñо¿Ö°Ô±ÑÝʾеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ


Ñо¿Ö°Ô±ÑÝʾеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ.png


¼ÓÖÝ´óѧÑо¿Ö°Ô±ÔÚ11ÔÂ18ÈÕÑÝʾÁËÒ»ÖÖеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ¡£¡£¡£SAD DNS£¨Side channel AttackeD DNS£©ÓÚ2020Äê11ÔÂÊ×´ÎÅû¶£¬£¬£¬£¬£¬£¬£¬£¬ËüÒÀÀµICMPµÄ¡°port unreachable¡±ÐÂÎÅÀ´ÍƶÏʹÓÃÄĸöÔÝʱ¶Ë¿Ú¡£¡£¡£Ê¹Óô˹¥»÷ģʽ¿É½«¶ñÒâµÄDNS¼Í¼עÈëDNS»º´æ£¬£¬£¬£¬£¬£¬£¬£¬È»ºó½«Ä¿µÄÁ÷Á¿Öض¨Ïòµ½¹¥»÷ÕßµÄЧÀÍÆ÷ÖУ¬£¬£¬£¬£¬£¬£¬£¬¾ÙÐÐÖÐÐÄÈË(MITM)¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬£¬´ËÖÖ¹¥»÷±£´æÓÚLinuxÉÏÔËÐеÄBIND¡¢UnboundºÍdnsmasqµÈDNSÈí¼þÖУ¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÔ¼38%µÄÓòÃûÆÊÎöÆ÷¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/11/new-side-channel-attacks-re-enable.html


ÃÀ¹ú֤ȯÉúÒâίԱ»á·¢Ã÷ð³äÆäÔ±¹¤µÄ´¹Âڻ


ÃÀ¹ú֤ȯÉúÒâίԱ»á·¢Ã÷ð³äÆäÔ±¹¤µÄ´¹Âڻ.png


ÃÀ¹ú֤ȯÉúÒâίԱ»á(SEC)Ͷ×ÊÕß½ÌÓýºÍÐû´«°ì¹«ÊÒ(OIEA)ÓÚ11ÔÂ19ÈÕÐû²¼¾¯±¨£¬£¬£¬£¬£¬£¬£¬£¬³Æ·¢Ã÷ð³äSECÔ±¹¤µÄ»î¶¯¡£¡£¡£¹¥»÷Õßͨ¹ýµç»°¡¢ÓïÒôÓʼþ¡¢µç×ÓÓʼþºÍÐżþ£¬£¬£¬£¬£¬£¬£¬£¬ÖÒÑÔÊÕ¼þÈËÆä»îÆÚ´æ¿î»ò¼ÓÃÜÇ®±ÒµÄÕË»§Öб£´æÎ´¾­ÊÚȨµÄÉúÒâ»òÆäËû¿ÉÒɻ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ë÷ÒªÆä¹ÉȨ¡¢Õʺš¢PINÂë¡¢ÃÜÂëµÈÐÅÏ¢¡£¡£¡£OIEA½¨ÒéÓû§ÔÚ·¢ËÍСÎÒ˽¼ÒÐÅϢ֮ǰ£¬£¬£¬£¬£¬£¬£¬£¬Ó¦ÏÈͨ¹ýÓʼþ»òÖµçSECÈ·¶¨·¢¼þÈ˵ÄÉí·Ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-sec-warns-investors-of-ongoing-govt-impersonation-attacks/


ÓÌËûÖÝÒ½ÁÆÖÐÐÄUIA½ü60Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶


ÓÌËûÖÝÒ½ÁÆÖÐÐÄUIA½ü60Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶.png


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÓÌËûÖÝ·ÅÉäÖÐÐÄUtah Imaging Associates(UIA)È·ÈÏ582170»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£Ð¹Â¶ÊÂÎñ±¬·¢ÔÚ8ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÔÚ̻¶ԼһÖܺ󣬣¬£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ4ÈÕ±»·¢Ã÷²¢ÓÚͬÈÕÐÞ¸´¡£¡£¡£´Ë´Îй¶ÁË»¼ÕßµÄÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹Üµ¥ºÅºÍÒ½ÁÆÐÅÏ¢µÈ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇãÏòÓÚ¹¥»÷ÏñUIAÕâÑùµÄÒ½ÁÆÖÐÐÄ£¬£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚËûÃÇÒÔΪ´ËÀàÊý¾ÝÔÚ°µÍøÖеļÛÖµ¸ü¸ß¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/utah-medical-center-hit-by-data-breach-affecting-582k-patients/


ProdaftÐû²¼¹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÆÊÎö±¨¸æ


ProdaftÐû²¼¹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÆÊÎö±¨¸æ.png


ProdaftÓÚ11ÔÂ18ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÉî¶ÈÆÊÎö±¨¸æ¡£¡£¡£ContiÊÇ˽ÓÐRaaS£¬£¬£¬£¬£¬£¬£¬£¬ÓÚ2019Äê12ÔÂβÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýTrickBot¾ÙÐÐÈö²¥¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬×Ô2021Äê7ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬Conti´ÓÊê½ðÖÐ׬ǮÖÁÉÙ2550ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬¶øContiÍÅ»ïÔòÉù³ÆÒÑ׬Ǯ3ÒÚÃÀÔª¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬Prodaft»¹¹ûÕæÁËContiµÄÖ§¸¶ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬ÆäЧÀÍÆ÷ÍйÜÔÚ217.12.204.135ÉÏ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃIPµØµãÊôÓÚÎÚ¿ËÀ¼ÍøITL LLC¡£¡£¡£Ôڸñ¨¸æÐû²¼¼¸Ð¡Ê±ºó£¬£¬£¬£¬£¬£¬£¬£¬ContiÍÅ»ï¾Í½«ÆäÖ§¸¶ÍøÕ¾¹Ø±Õ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.prodaft.com/resource/detail/conti-ransomware-group-depth-analysis


DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ


DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ.png


DevolutionsÔÚ11ÔÂ17ÈÕÐû²¼ÁË2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄÑо¿±¨¸æ¡£¡£¡£¸ÃÑо¿¾ÍÎå¸ö½¹µãÖ÷Ì⣺ÖÐСÆóÒµµÄÍøÂç¹¥»÷ºÍÍþв¡¢ÃÜÂëÖÎÀí¡¢Ê¹ÓõÄÌØÈ¨»á¼ûÖÎÀí¡¢Çå¾²ÅàѵºÍÖÎÀíÒÔ¼°Ç徲Ͷ×ʾÙÐÐÁËÆÊÎö¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬ÓëÈ¥ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬£¬72%µÄÖÐСÆóÒµÏÖÔÚÔ½·¢ÌåÌùÍøÂçÇå¾²£»£»£»ÖÎÀíÕß×îµ£ÐĵÄÍøÂçÍþвÊÇÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂںͶñÒâÈí¼þ£»£»£»52%µÄÆóÒµÔÚÈ¥ÄêÔâµ½¹ýÍøÂç¹¥»÷£»£»£»Ö»ÓÐ13%µÄÆóÒµÓµÓÐÍêÕûµÄPAM½â¾ö¼Æ»®¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.devolutions.net/2021/11/new-now-available-devolutions-state-of-cybersecurity-in-smbs-in-2021-2022-report