ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´

Ðû²¼Ê±¼ä 2021-12-22

ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´


ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´.png


12ÔÂ18ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Advanced Intelligence³ÆConti³ÉΪÊ׸ö½«Log4j2ÎäÆ÷»¯µÄרҵ¼¶ÀÕË÷ÔËÓªÍŻ£¬ £¬£¬£¬£¬£¬£¬ÏÖÒÑÓµÓÐÍêÕûµÄ¹¥»÷Á´¡£¡£¡£ ¡£¡£¡£¡£×èÖ¹12ÔÂ20ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ¸Ã¹¥»÷Á´Îª£ºEmotet -> Cobalt Strike -> Human Exploitation -> ȱÉÙADMIN$¹²Ïí -> Kerberoast -> VMWare vCenterЧÀÍÆ÷¡£¡£¡£ ¡£¡£¡£¡£Conti×Ô8Ô·Ý×îÏȾÙÐÐÁ˶à´Î¸üУ¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃеĺóÃźͱ¸·Ýɾ³ýÕ½ÂԵȡ£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/conti-ransomware-gang-has-full-log4shell-attack-chain/177173/


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515.png


12ÔÂ17ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬FBIÐû²¼¾¯±¨³ÆÓÐAPT×éÖ¯×Ô10ÔÂÏÂÑ®×îÏÈÒ»Ö±ÔÚÆð¾¢Ê¹ÓÃZohoÖеÄÎó²îCVE-2021-44515¡£¡£¡£ ¡£¡£¡£¡£ÕâÊÇManageEngine Desktop CentralÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£¡£FBI³Æ£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÈëÇÖDesktop CentralЧÀÍÆ÷ºó×°ÖÃÁýÕÖÆäÕýµ±¹¦Ð§µÄwebshell£¬£¬ £¬£¬£¬£¬£¬£¬È»ºóÏÂÔØÊ¹Óù¤¾ß£¬£¬ £¬£¬£¬£¬£¬£¬Ã¶¾ÙÓòÓû§ºÍȺ×飬£¬ £¬£¬£¬£¬£¬£¬¾ÙÐÐÍøÂçÕì̽£¬£¬ £¬£¬£¬£¬£¬£¬×îºóÊÔͼºáÏòÒÆ¶¯ºÍת´¢Æ¾Ö¤¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125821/hacking/zoho-zero-day-cve-2021-44515-fbi-alert.html


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î.png


΢ÈíÔÚ12ÔÂ20ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬ £¬£¬£¬£¬£¬£¬±Þ²ßÓû§¾¡¿ìÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î¡£¡£¡£ ¡£¡£¡£¡£Õâ2¸öÎó²îΪCVE-2021-42287ºÍCVE-2021-42278£¬£¬ £¬£¬£¬£¬£¬£¬ÒÑÔÚ2021Äê11ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£¡£ ¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâÁ½¸öÎó²î¿ÉÔÚActive DirectoryÇéÐÎÖн¨ÉèÒ»¸öÖ±½Ó»á¼ûÓòÖÎÀíÔ±Óû§µÄ·¾¶¡£¡£¡£ ¡£¡£¡£¡£12ÔÂ11ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁËʹÓÃÕâЩÎó²îµÄ¿´·¨ÑéÖ¤(PoC)¹¤¾ß£¬£¬ £¬£¬£¬£¬£¬£¬¾­²âÊÔÈ·¶¨¸Ã¹¤¾ß¿ÉÒÔÇáËɵؽ«Óû§È¨ÏÞÌáÉýÖÁÖÎÀíԱȨÏÞ¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-easy-windows-domain-takeover-via-active-directory-bugs/


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ.png


½Ý¿ËÇå¾²¹«Ë¾AvastÔÚ12ÔÂ16ÈÕÅû¶ÁËÕë¶ÔÃÀ¹úij¹Ù·½×éÖ¯µÄAPT¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£ ¡£¡£¡£¡£Avast²¢Î´¹ûÕæÄ¿µÄ×éÖ¯µÄÃû³Æ£¬£¬ £¬£¬£¬£¬£¬£¬¾ÝThe RecordÍÆ²âÓëÃÀ¹ú¹ú¼Ê×Ú½Ì×ÔÓÉίԱ»á(USCIRF)ÓйØ¡£¡£¡£ ¡£¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷¹¥»÷»î¶¯ÖÐʹÓõÄ2¸ö¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬£¬£¬µÚÒ»¸öαװ³Éoci.dll²¢Ê¹ÓÃÕýµ±Ó¦ÓÃWinDivertÀ´ÕìÌýInternetͨѶ£»£»£»£»µÚ¶þ¸öҲαװ³ÉÁËoci.dll£¬£¬ £¬£¬£¬£¬£¬£¬ÊÇÒ»¸ö½âÃÜÆ÷£¬£¬ £¬£¬£¬£¬£¬£¬Óëred signatureÐж¯ÖÐʹÓõĶñÒâÈí¼þºÜÊÇÏàËÆ¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/12/experts-discover-backdoor-deployed-on.html



T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°


T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°.png


12ÔÂ20ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬T-MobileÌåÏÖÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°£¬£¬ £¬£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÔÂʶ±ð»ò×èµ²ÁË18ÒÚ¸öÕ©Æ­µç»°¡£¡£¡£ ¡£¡£¡£¡£×èÖ¹2021Äê12ÔÂÉÏÑ®µÄÊý¾ÝÏÔʾ£¬£¬ £¬£¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÁ÷Á¿ÒѵִïÀúÊ·×î¸ßˮƽ£¬£¬ £¬£¬£¬£¬£¬£¬µÖ´ïÿÖÜԼĪ4.25ÒÚ´ÎʵÑ飬£¬ £¬£¬£¬£¬£¬£¬½ÏÖ®2020ÄêÔö·ùÁè¼Ý116%¡£¡£¡£ ¡£¡£¡£¡£Á÷Á¿×îµÍµÄÊÇ1Ô£¬£¬ £¬£¬£¬£¬£¬£¬ÓÐ11ÒÚ¸öÕ©Æ­µç»°£»£»£»£»µ½11Ô£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý³ÊÖ¸ÊýÔöÌí£¬£¬ £¬£¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÊýÄ¿ÊÇ1Ô·ݵÄÒ»±¶£¬£¬ £¬£¬£¬£¬£¬£¬µÖ´ïÁË25ÒÚ¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-it-blocked-21-billion-scam-calls-this-year/


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ.png


¾Ý±¨µÀ£¬£¬ £¬£¬£¬£¬£¬£¬×î½üÐû²¼µÄDell BIOS¸üе¼Ö¶à¿îÌõ¼Ç±¾µçÄÔºĮ́ʽ»ú·ºÆðÑÏÖØµÄÆô¶¯ÎÊÌâ¡£¡£¡£ ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨Dell LatitudeÌõ¼Ç±¾µçÄÔ£¨5320ºÍ5520£©£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°Dell Inspiron 5680 ºÍAlienware Aurora R8̨ʽ»ú¡£¡£¡£ ¡£¡£¡£¡£ÊÜÓ°ÏìÓû§³Æµ±ËûÃÇÆô¶¯×°±¸Ê±£¬£¬ £¬£¬£¬£¬£¬£¬»áÖ±½Ó½øÈëÀ¶ÆÁ²¢ÔٴιرÕ¡£¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬£¬£¬£¬ÔÚDellÐû²¼½â¾ö¼Æ»®Ö®Ç°£¬£¬ £¬£¬£¬£¬£¬£¬×î¼òÆÓµÄÐÞ¸´ÒªÁìÊǽµµ½ÒÔǰµÄ¹Ì¼þ°æ±¾¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/new-dell-bios-updates-cause-laptops-and-desktops-not-to-boot/