SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247

Ðû²¼Ê±¼ä 2022-01-26

SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬SolarWindsÐÞ¸´ÁËServ-UÖÐÒѱ»ÔÚҰʹÓõÄÊäÈëÑéÖ¤Îó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-35247£¬£¬ £¬£¬£¬£¬£¬ÓÉ΢ÈíÑо¿Ö°Ô±Jonathan Bar OrÔÚ¼à¿ØÊ¹ÓÃLog4j¿âÖеÄÎó²î¾ÙÐеĹ¥»÷ʱ·¢Ã÷¡£¡£¡£¡£¡£¡£¡£¿ £¿£¿£¿£¿É±»ÓÃÀ´ÔÚ¸ø¶¨Ò»Ð©ÊäÈëµÄÇéÐÎϹ¹½¨Ò»¸öÅÌÎÊ£¬£¬ £¬£¬£¬£¬£¬²¢ÔÚδ¾­´¦Öóͷ£µÄÇéÐÎÏÂͨ¹ýÍøÂç·¢Ë͸ÃÅÌÎÊ¡£¡£¡£¡£¡£¡£¡£SolarWindsͨ¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬LDAPÈÏÖ¤µÄServ-U webµÇ¼½çÃæÔÊÐí½ÓÊÜûÓгä·Ö¹ýÂ˵Ä×Ö·û£¬£¬ £¬£¬£¬£¬£¬¸ÃÎÊÌâÔÚServ-U 15.3Öнâ¾ö¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126933/security/solarwinds-serv-u-flaw.html



ASEC·¢Ã÷ͨ¹ýº«¹úWebHardƽ̨Èö²¥µÄDDoS IRC Bot


AhnLabÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ(ASEC)ÔÚ1ÔÂ19ÈÕÐû²¼µÄ±¨¸æÖÐÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬DDoS IRC BotÕýͨ¹ýº«¹úWebHardƽ̨Èö²¥¡£¡£¡£¡£¡£¡£¡£»£»£»î¶¯½«´øÓжñÒâÈí¼þµÄÓÎÏ·ÒÔZIPÎļþµÄÐÎʽÉÏ´«µ½ÍøÂçÓ²ÅÌ£¬£¬ £¬£¬£¬£¬£¬¸ÃÎļþÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ£¨¡°Game_Open.exe¡±£©£¬£¬ £¬£¬£¬£¬£¬Ëü³ýÁË¿ÉÒÔÆô¶¯ÓÎÏ·Í⣬£¬ £¬£¬£¬£¬£¬»¹»áÔËÐжñÒâÈí¼þpayload¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÊÇ»ùÓÚGoLangµÄDDoS IRC Bot£¬£¬ £¬£¬£¬£¬£¬±»ÓÃÓÚÌᳫÕë¶Ôº«¹úµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/01/ddos-irc-bot-malware-spreading-through.html



ÓªÏú¹«Ë¾RR Donnelly³ÆÆäÔâµ½ContiµÄÀÕË÷¹¥»÷


ýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬ÓªÏú¹«Ë¾RR Donnelly(RRD)ÈÏ¿ÉÆäÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£12ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬RRDÏòSECÌá½»8-K±í¸ñ³ÆËûÃǵÄϵͳÔâµ½ÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬ÆäÒѹرÕϵͳ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£¡£1ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬ContiÍÅ»ïÉù³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬£¬£¬£¬£¬²¢ÒÑ´ÓRRDÇÔÈ¡ÁË2.5GBÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬£¬£¬£¬ContiÔÚÓëRRD¾ÙÐÐ̸Åк󣬣¬ £¬£¬£¬£¬£¬Òѽ«ÕâЩÊý¾Ýɾ³ý¡£¡£¡£¡£¡£¡£¡£1ÔÂ18ÈÕ£¬£¬ £¬£¬£¬£¬£¬RRDÓÖÐû²¼ÁËÒ»·Ý8-KÎļþ£¬£¬ £¬£¬£¬£¬£¬ÈÏ¿ÉÆäÊý¾ÝÒÑÔÚ¹¥»÷ʱ´ú±»µÁ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/marketing-giant-rrd-confirms-data-theft-in-conti-ransomware-attack/



ÁÔÓ¥Ðж¯IIÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×é֯Эµ÷µÄÁÔÓ¥Ðж¯IIÒÑÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨»î¶¯¿ªÕ¹ÓÚ2021Äê12ÔÂ12ÈÕÖÁ22ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÊÇ2020ÄêÁÔÓ¥Ðж¯IÖ®ºó¶ÔÌØ¶¨×éÖ¯µÄµÚ¶þ´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯µÄͨ¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬±»²¶µÄÏÓÒÉÈË¿ÉÄÜÒѹ¥»÷50000¶à¸öÄ¿µÄ£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐÒ»È˵ÄÌõ¼Ç±¾ÉÏÓÐÁè¼Ý800000¸öDZÔÚÄ¿µÄÓòµÄƾ֤¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÒÔΪ£¬£¬ £¬£¬£¬£¬£¬²¿·Ö±»²¶ÕßÊôÓÚBECÍÅ»ïSilverTerrier£¨ÓÖÃûTMT£©¡£¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/operation-falcon-ii-silverterrier-nigerian-bec/



Ñо¿ÍŶÓÔÚÒ°·¢Ã÷Õë¶Ô¼ÓÃÜÇ®±ÒµÄжñÒâÈí¼þBHUNT


BitdefenderÓÚ1ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬ £¬£¬£¬£¬£¬Åû¶Ð¶ñÒâÈí¼þBHUNTµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£BHUNTÊÇÒ»¸öÓÃ.NET ±àдµÄÄ£¿ £¿£¿£¿£¿é»¯ÇÔÈ¡³ÌÐò£¬£¬ £¬£¬£¬£¬£¬Äܹ»ÇÔÈ¡¼ÓÃÜÇ®°ü£¨Exodus¡¢Electrum¡¢Atomic¡¢JaxxºÍEthereumµÈ£©ÖеÄÄÚÈÝ¡¢´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂëÒÔ¼°´Ó¼ôÌù°åÖв¶»ñµÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Éæ¼°°Ä´óÀûÑÇ¡¢°£¼°¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÈÕ±¾¡¢ÂíÀ´Î÷ÑÇ¡¢Å²Íþ¡¢ÐÂ¼ÓÆÂ¡¢ÄÏ·Ç¡¢Î÷°àÑÀºÍÃÀ¹ú£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÆÆ½âÈí¼þ×°ÖóÌÐò¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£


https://www.bitdefender.com/blog/labs/poking-holes-in-crypto-wallets-a-short-analysis-of-bhunt-stealer/



Crypto.com½ü500¸öÕË»§±»ºÚ£¬£¬ £¬£¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ


ýÌå1ÔÂ20Èճƣ¬£¬ £¬£¬£¬£¬£¬ÐÂ¼ÓÆÂCrypto.comÐû²¼µÄÉùÃ÷ÌåÏÖÆä483¸öÕË»§±»ºÚ£¬£¬ £¬£¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£¡£×î³õ£¬£¬ £¬£¬£¬£¬£¬²¿·ÖÓû§±¨¸æÆäÕÊ»§±£´æ¿ÉÒÉÉúÒ⣬£¬ £¬£¬£¬£¬£¬Ö»¹ÜÊܵ½2FA±£»£»£»¤µ«ÈÔÓÐÊýǧÃÀÔªETH±»µÁ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ1ÔÂ17ÈÕÊ״μì²âµ½¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÆäʱÉÙÊýÓû§µÄÕÊ»§Éϱ£´æÎ´¾­ÊÚȨµÄÌá¿î¡£¡£¡£¡£¡£¡£¡£Ö®ºó¹«Ë¾ÔÝÍ£ÁËËùÓÐÌá¿îÉúÒ⣬£¬ £¬£¬£¬£¬£¬ÔÚ¾­ÓÉÇå¾²¼Ó¹Ìºó£¬£¬ £¬£¬£¬£¬£¬Ìá¿îЧÀÍÓÚ1ÔÂ18ÈÕÏÂÖç5:46×óÓÒ»Ö¸´¡£¡£¡£¡£¡£¡£¡£Crypto.comÌåÏÖÒÑ×èÖ¹´ó²¿·Öδ¾­ÊÚȨµÄÌá¿î£¬£¬ £¬£¬£¬£¬£¬²¢½«ÎªÊÜÓ°Ïì¿Í»§È«¶î±¨Ïú¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/



Çå¾²¹¤¾ß


Raven


ÊǼò»¯¡¢¿É¶¨ÖÆÇÒÏìӦѸËٵĸ߼¶ÍøÂçÍþвͼ¡£¡£¡£¡£¡£¡£¡£


https://github.com/qeeqbox/raven


Espoofer


ÊÇÒ»ÖÖ¿ªÔ´²âÊÔ¹¤¾ß£¬£¬ £¬£¬£¬£¬£¬¿ÉÈÆ¹ýµç×ÓÓʼþϵͳÖÐµÄ SPF¡¢DKIM ºÍ DMARC Éí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£


https://github.com/chenjj/espoofer


pip-audit


ÊÇÒ»ÖÖÓÃÓÚɨÃè Python ÇéÐÎÒÔ²éÕÒ¾ßÓÐÒÑÖªÎó²îµÄ°üµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£


https://github.com/trailofbits/pip-audit


Çå¾²ÆÊÎö


Õë¶ÔÎÚ¿ËÀ¼¹Ù·½ÍøÕ¾µÄ¶ñÒâÈí¼þWhisperGateÆÊÎö


1ÔÂ13ÈÕÎÚ¿ËÀ¼´ó×ڵĹٷ½ÍøÕ¾±»¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÎÄÕÂÆÊÎöÁ˸ÃÊÂÎñÖжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£


https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3


2021 ÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö


´ÓÒ»Ö±Éú³¤µÄÀÕË÷Èí¼þÉú̬ϵͳµ½Õë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÈüÃÅÌú¿Ë»ØÊ×ÁË 2021 ÄêµÄÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021



Ó¢¹úNCSCÐû²¼×éÖ¯µÖÓùµç»°ºÍ¶ÌÐÅڲƭ»î¶¯µÄÖ¸ÄÏ


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC) Ðû²¼Á˵ÄÖ¸ÄÏÖ¼ÔÚ±£»£»£»¤¿Í»§ÃâÊÜڲƭ»î¶¯µÄ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬Í¬Ê±È·±£ËûÃÇµÄ SMS ºÍµç»°ÐÂÎſɿ¿¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126916/security/ncsc-guidance-communications-with-customers.html