¶íÂÞ˹FSBÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil²¢¾Ð²¶Æä14Ãû³ÉÔ±
Ðû²¼Ê±¼ä 2022-01-18¶íÂÞ˹FSBÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil²¢¾Ð²¶Æä14Ãû³ÉÔ±

¾ÝýÌå1ÔÂ4ÈÕ±¨µÀ£¬£¬£¬¶íÂÞ˹Áª°îÇå¾²¾ÖFSBÒÑÀֳɵ·»ÙÀÕË÷ÍÅ»ïREvil¡£¡£¡£¡£REvilÊÇÈ¥Äê×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò»£¬£¬£¬Ôø¹¥»÷ÁËJBSºÍKaseya¡£¡£¡£¡£¾Ý³ÆÕâÊÇÓ¦ÃÀ¹úÕþ¸®ÒªÇó¾ÙÐеÄͻϮÐж¯£¬£¬£¬Ö´·¨»ú¹¹ËѲéÁËĪ˹¿ÆºÍÊ¥±ËµÃ±¤µÈ¶¼»áµÄ25¸öËùÔÚ£¬£¬£¬²¢¾Ð²¶ÁË14ÃûÍÅ»ï³ÉÔ±£¬£¬£¬ÆäÖÐ1È˼ÓÈëÁË2021Äê5ÔÂÕë¶ÔColonial PipelineµÄ¹¥»÷£¬£¬£¬ÕâÔÙ´Î֤ʵÁËREvilÓëDarkSideÓйØÁª ¡£¡£¡£¡£±ðµÄ£¬£¬£¬FSB»¹²é»ñÁËÁè¼Ý4.26ÒÚ¬²¼£¬£¬£¬ÒÔ¼°ÓÃÓÚ·¸·¨»î¶¯µÄÅÌËã»ú¡¢¼ÓÃÜÇ®°üºÍ20Á¾Æû³µ¡£¡£¡£¡£
https://threatpost.com/russian-security-revil-ransomware/177660/
ÎÚ¿ËÀ¼µÄ70¶à¸ö¹Ù·½ÍøÕ¾Í¬Ê±Ôâµ½´ó¹æÄ£¹¥»÷
1ÔÂ14ÈÕ£¬£¬£¬ÎÚ¿ËÀ¼Õþ¸®ÔËÓªµÄÁè¼Ý70¸öÍøÕ¾ÀëÏßÊýСʱ¡£¡£¡£¡£ÕâËÆºõÊÇÔ´ÓÚÒ»³¡´ó¹æÄ£µÄÐÍ¬ÍøÂç¹¥»÷£¬£¬£¬¸Ã¹úÖ´·¨²¿·ÖÌåÏÖ¿ÉÄÜÓë¶íÂÞ˹Óйء£¡£¡£¡£ÎÚ¿ËÀ¼CERTÉù³ÆÕâЩ¹¥»÷¿ÉÄÜʹÓÃÁËLaravel-based October CMSÖеÄÎó²î(CVE-2021-32648)£¬£¬£¬Õë¶ÔÎÚ¿ËÀ¼ÄÚ¸ó¡¢½ÌÓý¡¢Å©Òµ¡¢ÄÜÔ´¡¢ÍËÎéÎäÊ¿ÊÂÎñºÍÇéÐβ¿µÈ¶à¸ö²¿·ÖµÄÍøÕ¾¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯½öÔÚ±»ÈëÇÖÍøÕ¾µÄÖ÷Ò³ÉÏÐû²¼ÁËÑ°ÐÆÐÔÐÅÏ¢£¬£¬£¬²¢ÎÞСÎÒ˽¼ÒÊý¾Ýй¶µÄÇéÐΡ£¡£¡£¡£
https://thehackernews.com/2022/01/massive-cyber-attack-knocks-down.html
È«Çò×î´óÐÅÓÿ¨ÉúÒâ°µÍøÊг¡UniCCÐû²¼½«×èÖ¹ÔËÓª
ýÌå1ÔÂ15ÈÕ±¨µÀ£¬£¬£¬È«Çò×î´óµÄÐÅÓÿ¨ºÍ½è¼Ç¿¨ÐÅÏ¢ÉúÒâ°µÍøÊг¡UniCCÐû²¼½«×èÖ¹ÔËÓª¡£¡£¡£¡£¸ÃÍøÕ¾ÓÚ2013ÄêÍÆ³ö£¬£¬£¬¾ÝÔ¤¼ÆÍ¨¹ý¸Ãƽ̨ÉúÒâµÄ¼ÓÃÜÇ®±ÒԼΪ3.58ÒÚÃÀÔª£¬£¬£¬1ÔÂ·ÝÆäÊг¡·Ý¶îµÖ´ïÁË30%¡£¡£¡£¡£UniCCÖÎÀíÔ±ÔÚÐû²¼¹Ø±ÕÐÂÎÅºó¸ø»áÔ±Áô³öÁË10Ììʱ¼äÀ´ÏûºÄÓà¶î£¬£¬£¬²¢ÌåÏÖÕâÊÇËûÃÇ×ö³öµÄ¾öÒ飬£¬£¬²»Òª¾ÙÐÐÒõıÂÛ¡£¡£¡£¡£±ðµÄ£¬£¬£¬½ü¼¸¸öÔÂÓжà¸ö°µÍøÊг¡¹Ø±Õ£¬£¬£¬°üÀ¨White House Market£¨10Ô£©¡¢Cannazon£¨11Ô£©¡¢Torrez£¨12Ô£©ºÍMonopoly Market£¨1Ô³õ£©¡£¡£¡£¡£
https://securityaffairs.co/wordpress/126757/cyber-crime/unicc-shutting-down.html
ÀÕË÷Èí¼þQlocker»Ø¹é£¬£¬£¬ÔÙ´ÎÃé׼ȫÇòµÄQNAP NAS×°±¸
¾ÝýÌå1ÔÂ15Èճƣ¬£¬£¬ÀÕË÷Èí¼þQlocker»Ø¹é£¬£¬£¬²¢ÔÙ´ÎÃé׼ȫÇòµÄQNAPÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£´ËǰQlockerÔøÔÚ4ÔÂ19ÈÕ×îÏÈ´ó¹æÄ£¹¥»÷QNAP¿Í»§£¬£¬£¬²¢Ê¹ÓÃ7-zip¼ÓÃÜÊý¾Ý¡£¡£¡£¡£ÐµÄÀÕË÷»î¶¯Ê¼ÓÚ1ÔÂ6ÈÕ£¬£¬£¬Ëü»áÔÚ±»ÈëÇÖ×°±¸ÉÏÁôÏÂÃûΪ!!!READ_ME.txtµÄÊê½ð¼Í¼£¬£¬£¬ÆäÖд󲿷ÖÄ¿µÄ±»ÒªÇóÖ§¸¶0.02µ½0.03±ÈÌØ±Ò¡£¡£¡£¡£Õâ²¢²»ÊÇΨһÕë¶ÔQNAP NASµÄÀÕË÷Èí¼þ£¬£¬£¬×ÔÊ¥µ®½Ú×îÏÈ£¬£¬£¬ech0raixÕë¶ÔÆäµÄ¹¥»÷»î¶¯¼¤Ôö¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/qlocker-ransomware-returns-to-target-qnap-nas-devices-worldwide/
¹ú·À³Ð°üÉÌHensoldt³ÆÆäÓ¢¹ú×Ó¹«Ë¾ÒÑѬȾLorenz
¾Ý1ÔÂ14Èյı¨µÀ³Æ£¬£¬£¬µÂ¹ú¹ú·À³Ð°üÉÌHensoldtÈÏ¿ÉÆäÓ¢¹ú×Ó¹«Ë¾ÒÑѬȾÀÕË÷Èí¼þLorenz¡£¡£¡£¡£Lorenz×Ô4ÔÂ×îÏÈ»îÔ¾£¬£¬£¬Êê½ðÒªÇóΪ500000µ½700000ÃÀÔªÖ®¼ä¡£¡£¡£¡£2021Äê12ÔÂ17ÈÕ£¬£¬£¬LorenzÉù³ÆÒѹ¥»÷Hensoldt£¬£¬£¬²¢ÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÒÔÃÜÂë±£»£»£»£»¤ÎļþµÄÐÎʽÐû²¼ÁË95%µÄ±»µÁÎļþ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬µ«Ö»ÓÐÓ¢¹ú×Ó¹«Ë¾µÄ²¿·ÖÒÆ¶¯×°±¸Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£
https://securityaffairs.co/wordpress/126738/malware/lorenz-ransomware-hit-hensoldt.html
eNomÊý¾ÝÖÐÐÄǨá㱬·¢¹ýʧµ¼ÖÂЧÀÍÔÝʱÖÐÖ¹
1ÔÂ16ÈÕ£¬£¬£¬ÍøÂçÍйÜЧÀÍÉÌeNomµÄÊý¾ÝÖÐÐÄǨáã·ºÆð¹ýʧ£¬£¬£¬µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹¡£¡£¡£¡£²¿·ÖÓû§±¨¸æ³ÆÎÞ·¨ÔÙ¼û¼ûÍøÕ¾ºÍÓÊÏ䣬£¬£¬ÉÐÓÐÓû§ÌåÏÖÆäGmailÏÔʾÓÉÓÚeNomÕýÔÚ¾ÙÐÐÊý¾ÝÖÐÐÄǨá㣬£¬£¬DNSÎÞ·¨Õý³£ÊÂÇé¡£¡£¡£¡£¾ÓÉÊӲ죬£¬£¬¸Ã¹«Ë¾·¢Ã÷ÓòÃûÆÊÎöÎÊÌâÓ°ÏìÁËÊý°Ù¸öÓòÃû£¬£¬£¬ÊÜÎÊÌâÓ°ÏìÓû§ÎÞ·¨¸ü¸ÄNameServers£¬£¬£¬ËûÃÇËùÄÜ×öµÄ¾ÍÊÇÆÚ´ýǨáãÍê³É¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/enom-data-center-migration-mistakenly-knocks-sites-offline/
Çå¾²¹¤¾ß
PasteMonitor
ץȡ Pastebin API ÒÔÍøÂçÖðÈÕÕ³Ìù£¬£¬£¬ÉèÖÃwordlist²¢ÔÚÆ¥Åäʱͨ¹ýµç×ÓÓʼþÎüÊÕ¾¯±¨¡£¡£¡£¡£
https://github.com/pixelbubble/PasteMonitor
ipsourcebypass
´Ë Python ¾ç±¾¿ÉÓÃÓÚÈÆ¹ýʹÓà HTTP ±êÍ·µÄ IP Ô´ÏÞÖÆ¡£¡£¡£¡£
https://github.com/p0dalirius/ipsourcebypass
elfloader
elfloader ÊÇÒ»¸ö³¬µÈ¼òÆÓµÄ ELF Îļþ¼ÓÔØÆ÷£¬£¬£¬ËüÌìÉúELFÔÚÄÚ´æÖÐµÄÆ½ÃæÌåÏÖ¡£¡£¡£¡£
https://github.com/gamozolabs/elfloader
Çå¾²ÆÊÎö
ÓÉÓÚÆúÓÃSGX£¬£¬£¬ÐµÄÓ¢ÌØ¶ûоƬ½«ÎÞ·¨²¥·ÅÀ¶¹â¹âÅÌ
µÚ12´úÓ¢ÌØ¶û¿áî£11000ºÍ12000´¦Öóͷ£Æ÷×÷·ÏÁ˶ÔSGX£¨Èí¼þ±£»£»£»£»¤À©Õ¹£©µÄÖ§³Ö£¬£¬£¬µ¼ÖÂPCÎÞ·¨²¥·Å4KÇø·ÖÂʵÄÀ¶¹â¹âÅÌ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-intel-chips-wont-play-blu-ray-disks-due-to-sgx-deprecation/
CVE-2021-45039£ºÔ¶³Ì´úÂëÖ´ÐÐÎó²î
UniviewרÓÐÐÒé¼àÌýUDP¶Ë¿Ú7788µÄÎó²îÔÊÐíÔ¶³Ìδ¾Éí·ÝÑéÖ¤µÄʹÓûº³åÇøÒç³öÎó²î£¬£¬£¬¿É»ñµÃ¶Ô×°±¸µÄroot»á¼ûȨ¡£¡£¡£¡£
https://ssd-disclosure.com/ssd-advisory-uniview-preauth-rce/


¾©¹«Íø°²±¸11010802024551ºÅ