Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
Ðû²¼Ê±¼ä 2022-04-06Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
3ÔÂ30ÈÕ£¬£¬£¬FortinetÐû²¼±¨¸æ³ÆÆä¼ì²âµ½APT×éÖ¯Deep PandaµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïʹÓÃLog4ShellÎó²î¹¥»÷VMware HorizonЧÀÍÆ÷£¬£¬£¬×îÖÕÖ¼ÔÚ×°ÖÃÒ»¸öÃûΪFire ChiliµÄÐÂÐÍrootkit¡£¡£¡£¡£¡£¡£¡£¸ÃrootkitʹÓÃFrostburn Studios£¨ÓÎÏ·¿ª·¢ÉÌ£©ºÍComodo£¨Çå¾²Èí¼þ£©µÄÖ¤Êé¾ÙÐÐÊý×ÖÊðÃû£¬£¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìDeep Panda»î¶¯Ê±£¬£¬£¬Fortinet·¢Ã÷ÆäÓëWinntiÓÐÖØµþ¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶Ô½ðÈÚ¡¢Ñ§Êõ¡¢»¯×±Æ·ºÍÂÃÓÎÐÐÒµ¡£¡£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits
Kaspersky³ÆLazarusʹÓÃľÂí»¯DeFi Wallet·Ö·¢ºóÃÅ
KasperskyÔÚ3ÔÂ31ÈÕÐû²¼±¨¸æ³Æ£¬£¬£¬³¯ÏʺڿÍÍÅ»ïLazarusÕýÔÚʹÓÃľÂí»¯DeFiÓ¦Ó÷ַ¢ºóÃÅ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Ò»¸öľÂí»¯DeFi Wallet£¬£¬£¬±àÒëÈÕÆÚΪ2021Äê11Ô£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄϵͳÉÏ×°ÖÃÒ»¸ö¹¦Ð§ÆëÈ«µÄºóÃÅ£¬£¬£¬¸ÃºóÃÅαװ³ÉÁËGoogle Chromeä¯ÀÀÆ÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÓ¦Óõķַ¢ÒªÁ죬£¬£¬ÍƲâ¿ÉÄÜÊÇ´¹ÂÚÓʼþ»òͨ¹ýÉ罻ýÌå¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷ÕßʹÓÃÁËλÓÚº«¹úµÄЧÀÍÆ÷ÓëºóÞÙÐÐͨѶ¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/lazarus-trojanized-defi-app/106195/
INKYÔÚ½üÆÚ·¢Ã÷ÐÂÒ»ÂÖʹÓÃCalendlyµÄ´¹ÂÚ¹¥»÷»î¶¯
¾ÝýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬INKYÑо¿ÍŶӷ¢Ã÷ʹÓÃCalendlyµÄ´¹Âڻ¡£¡£¡£¡£¡£¡£¡£CalendlyÊÇÒ»¿îÊ¢ÐеÄÃâ·ÑÈÕÀúÓ¦Ó㬣¬£¬¼¯³ÉÁËZoom£¬£¬£¬¿ÉÓÃÓÚ°²ÅžۻáºÍÔ¼»á¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ2ÔÂ⣬£¬£¬¹¥»÷Õßͨ¹ýCalendlyƽ̨ÌìÉú´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£¡£Ê×ÏÈʹÓÃCalendlyÌí¼Ó×Ô½ç˵Á´½ÓµÄ¹¦Ð§²åÈë¶ñÒâÁ´½Ó£¬£¬£¬¸ÃÁ´½ÓǶÈëÔÚÉó²éÎĵµ°´¼üÖУ¬£¬£¬Óû§µã»÷ºó»á±»Öض¨Ïòµ½´¹ÂÚÒ³Ãæ£¬£¬£¬×îÖÕÇÔȡĿµÄµÄMicrosoftµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-microsoft-credentials-phishing/
PaloAlto Networks¶Ô¿Í»§ÌṩµÄÊÖÒÕÖ§³ÖÐÅÏ¢ÒâÍâй¶
ýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬PaloAlto Networks(PAN) Ö§³ÖϵͳÖÐÉèÖùýʧµ¼Ö¿ͻ§µÄÃô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÓÉPANµÄÒ»¸ö¿Í»§ÔÚ±¾Ô·¢Ã÷£¬£¬£¬Ëû³Æ¿ÉÒÔ¿´µ½Ô¼Äª1989¸ö²»ÊôÓÚËûÃǵÄ×éÖ¯µÄÊÖÒÕÖ§³ÖÊÂÎñ¼Í¼£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚɨ³ý¹ýʧµÄ·À»ðǽÈÕÖ¾¡¢ÉèÖÃת´¢ºÍÍøÂçÇå¾²×é(NSG)½á¹¹µÈ¡£¡£¡£¡£¡£¡£¡£PANÌåÏÖûÓÐÈκÎÊý¾Ý±»ÏÂÔØ£¬£¬£¬²¢ÌåÏÖ´Ë´Îй¶ÊÂÎñµÄ¹æÄ£½öÏÞÓÚһλ¿Í»§¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬¸ÃÎÊÌâµÄÐÞ¸´Ô¼ÄªÐèÒª8Ììʱ¼ä¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/palo-alto-networks-error-exposed-customer-support-cases-attachments/
AquaÐû²¼Õë¶ÔJupyter NotebookµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ
Aqua SecurityÓÚ3ÔÂ29ÈÕÐû²¼ÁËÕë¶ÔJupyterµÄ»ùÓÚPythonµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Jupyter NotebookÊÇÊý¾ÝרҵְԱÓÃÀ´´¦Öóͷ£Êý¾Ý¡¢±àдºÍÖ´ÐдúÂëÒÔ¼°¿ÉÊÓ»¯Ð§¹ûµÄ¿ªÔ´WebÓ¦Óᣡ£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÉèÖùýʧµÄÓ¦Óûá¼ûЧÀÍÆ÷£¬£¬£¬ÏÂÔØÓÃÓÚ¹¥»÷µÄ¿âºÍ¹¤¾ß£¨ÀýÈç¼ÓÃܳÌÐò£©£¬£¬£¬È»ºóͨ¹ýÕ³ÌùPython´úÂë²¢Ö´Ðо籾ÊÖ¶¯½¨ÉèÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¿ÉÄÜÓë¶íÂÞ˹µÄºÚ¿ÍÍÅ»ïÓйء£¡£¡£¡£¡£¡£¡£
https://blog.aquasec.com/python-ransomware-jupyter-notebook
Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ
4ÔÂ1ÈÕ£¬£¬£¬Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ¡£¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪProcess ManagerµÄ¶ñÒâAPK¡£¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬Ëü»áʹÓóÝÂÖÐÎͼ±êÒþ²ØÔÚAndroid×°±¸ÉÏ£¬£¬£¬Î±×°³Éϵͳ×é¼þ£¬£¬£¬²¢ÒªÇó»ñȡװ±¸µÄλÖᢷ¢ËͺÍÔĶÁÎı¾¡¢»á¼û´æ´¢¡¢Ê¹ÓÃÏà»úÕÕÏàÒÔ¼°Â¼ÖÆÒôƵµÈ18ÏîȨÏÞ¡£¡£¡£¡£¡£¡£¡£Ëü»¹»áÏÂÔØÆäËüµÄpayload£¬£¬£¬ÀýÈçRoz Dhan£¬£¬£¬¸ÃÌØ¹¤Èí¼þ¿ÉÄÜ»áͨ¹ý´ËÖÖ·½·¨£¬£¬£¬×¬È¡ÍƼöÓ¦ÓõÄÓ¶½ð¡£¡£¡£¡£¡£¡£¡£
https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
Çå¾²¹¤¾ß
Socid-Extractor
´ÓСÎÒ˽¼Ò×ÊÁÏÍøÒ³/API ÏìÓ¦ÖÐÌáÈ¡ÓйØÓû§µÄÐÅÏ¢£¬£¬£¬²¢½«ÆäÉúÑÄΪ»úе¿É¶ÁÃûÌᣡ£¡£¡£¡£¡£¡£
https://github.com/soxoj/socid-extractor
GitBleed Tools
ÓÃÓÚ´Ó¾µÏñ git ´æ´¢¿âÖÐÌáÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://github.com/nightwatchcybersecurity/gitbleed_tools
ggshield
ÊÇÒ»¸ö CLI Ó¦ÓóÌÐò£¬£¬£¬¼ì²âÔ´´úÂëÖеÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£
https://github.com/GitGuardian/ggshield
PackMyPayload
ÓÃÓÚ½«payload´ò°üµ½×÷Ϊ´æµµ/ÈÝÆ÷µÄÊä³öÎļþÖС£¡£¡£¡£¡£¡£¡£
https://securityonline.info/packmypayload-packages-payloads-into-output-containers/
Çå¾²ÆÊÎö
ºÚ¿ÍÂÛ̳ÉϳöÊÛµÄРBlackGuard ÃÜÂëÇÔÈ¡¶ñÒâÈí¼þ
https://www.bleepingcomputer.com/news/security/new-blackguard-password-stealing-malware-sold-on-hacker-forums/
FORCEDENTRY£ºÉ³ºÐÌÓÒÝ
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html
Microsoft Build ½«ÓÚ 5 Ô 24 ÈÕÆô¶¯
https://news.softpedia.com/news/microsoft-build-will-kick-off-on-may-24-535139.shtml
Atento³ÆÈ¥ÄêµÄLockBitÀÕË÷¹¥»÷Ôì³É4200ÍòÃÀÔªËðʧ
https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/
Anonymous¹¥»÷¶íÂÞ˹Ͷ×ʹ«Ë¾Thozis Corp
https://securityaffairs.co/wordpress/129651/hacktivism/anonymous-hacked-thozis-corp.html
ÍøÂç´¹ÂÚʹÓà Azure ¾²Ì¬ÍøÒ³Ã°³ä΢Èí
https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-web-pages-to-impersonate-microsoft/


¾©¹«Íø°²±¸11010802024551ºÅ