Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-06-301¡¢Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷
¾ÝýÌå6ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Á¢ÌÕÍðµÄ¹ú¼Ò˰Îñ¼à²ì¾Ö(STI)ºÍ»á¼ÆÐ§ÀÍÌṩÉÌB1.ltµÈ¶à¸ö×éÖ¯Ôâµ½ÁËKillnetÍÅ»ïµÄDDoS¹¥»÷¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NKSC)֤ʵ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁ˹ú¼ÒÇå¾²Êý¾Ý´«ÊäÍøÂçÒÔ¼°Ë½ÓªºÍ¹«¹²²¿·ÖµÄ×éÖ¯¡£¡£¡£²¢ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜ»áÒ»Á¬¼¸Ì죬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÕë¶ÔͨѶ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¡£¡£¡£KillnetÔÚÒ»¶ÎÊÓÆµÖÐÉù³Æ¶Ô´ËÊÂÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ôö²¹ËµËûÃÇÒѾ¹¥»÷ÁË1652¸öÍøÂç×ÊÔ´£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ39СʱÄÚʵÏÖÁ˶ÔÁ¢ÌÕÍð70%µÄÍøÂç»ù´¡ÉèÊ©µÄ¸ôÀë¡£¡£¡£
https://www.hackread.com/russia-killnet-group-lithuania-sites-ddos-attacks/
2¡¢Service Fabric±£´æÎó²îFabricScape£¨CVE-2022-30137)
6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Unit 42Åû¶ÁË΢ÈíService FabricÖеÄÎó²îFabricScape£¨CVE-2022-30137)µÄÏêÇé¡£¡£¡£¸ÃÎó²î±£´æÓÚÕï¶ÏÍøÂçÊðÀí(DCA)×é¼þÖУ¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÉèÖÃΪ¾ßÓÐÔËÐÐʱ»á¼ûȨÏÞµÄÈÝÆ÷Éϱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬ËäÈ»±£´æÓÚÁ½¸ö²Ù×÷ϵͳƽ̨ÉÏ£¬£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÄÜÔÚLinuxÉϱ»Ê¹Óᣡ£¡£Î¢Èí͸¶³Æ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»ÓÃÀ´ÌáȨ£¬£¬£¬£¬£¬£¬£¬£¬²¢»ñµÃ¶Ô×ÊÔ´Ö÷»úSF½ÚµãºÍÕû¸ö¼¯ÈºµÄ¿ØÖÆÈ¨¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔÚService Fabric 9.0ÀÛ»ý¸üÐÂÖлñµÃÐÞ¸´¡£¡£¡£
https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137/
3¡¢Zscaler·¢Ã÷EvilnumÍÅ»ï»ØºÏ²¢Õë¶ÔÓ¢¹úºÍÅ·ÖÞµØÇø
ZscalerÔÚ6ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬£¬£¬EvilnumÍÅ»ïÒѾ»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËеÄÕ½Êõ¡¢ÊÖÒպͳÌÐò¡£¡£¡£½ñÄê3Ô£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÆäÄ¿µÄÑ¡ÔñÓÐÖØ´ó±ä»»£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÔÀ´µÄ½ðÈڿƼ¼ÁìÓòµÄ×é֯ת±äΪ´¦Öóͷ£¹ú¼ÊÒÆÃñЧÀ͵ÄÕþ¸®¼ä×éÖ¯¡£¡£¡£¹¥»÷ʹÓõÄÓÕ¶üÎļþͨ³£¶¼°üÀ¨ºÏ¹æ£¨compliance£©Ò»´Ê£¬£¬£¬£¬£¬£¬£¬£¬ÆäÄ£°å×¢Èë½×¶ÎʹÓõĻùÓÚºêµÄÎĵµÊ¹ÓÃÁËVBA code stompingÊÖÒÕÀ´Èƹý¾²Ì¬ÆÊÎö²¢±ÜÃâÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÑÏÖØ»ìÏýµÄJavaScriptÀ´½âÃܲ¢×°ÖÃpayload¡£¡£¡£
https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets
4¡¢Cyble³ÆÓÐÁè¼Ý90Íò¸öÉèÖùýʧµÄKubernetes̻¶ÔÚÍøÉÏ
¾Ý6ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬CybleµÄÒ»ÏîÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý900000¸öKubernetes̻¶ÔÚÍøÉÏ¡£¡£¡£KubernetesÊÇÒ»¸ö¸ß¶ÈͨÓõĿªÔ´ÈÝÆ÷±àÅÅϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÉèÖò»×¼È·£¬£¬£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õß»á¼ûÄÚ²¿×ÊÔ´ºÍ˽ÓÐ×ʲú¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÓë¹¥»÷ÕßÀàËÆµÄɨÃ蹤¾ßºÍËÑË÷ÅÌÎÊÀ´¶¨Î»Ì»Â¶µÄKubernetesʵÀý£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐ65%£¨585000̨£©Î»ÓÚÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬£¬9%λÓڵ¹ú£¬£¬£¬£¬£¬£¬£¬£¬¶øºÉÀ¼ºÍ°®¶ûÀ¼¸÷Õ¼6%£»£»£»£»£»£»£»£»Ì»Â¶×î¶àµÄTCP¶Ë¿ÚÊÇ443£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǶ˿Ú10250ºÍ6443¡£¡£¡£
https://www.infosecurity-magazine.com/news/misconfigured-kubernetes-exposed/
5¡¢ÐÂľÂíZuoRATÖ÷ÒªÕë¶ÔλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷
Lumen Black Lotus LabsÔÚ6ÔÂ28ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬ÐµĶ༶Զ³Ì»á¼ûľÂíZuoRATÒѱ»ÓÃÓÚͨ¹ýλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷¹¥»÷Ô¶³ÌÊÂÇéÖ°Ô±¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýɨÃèÒÑÖªµÄδÐÞ²¹Îó²î¶Ô·ÓÉÆ÷µÄ¾ÙÐгõʼ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬È»ºó×°ÖÃCobalt Strike beacons£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°2¸ö×Ô½ç˵ºóÃÅ£º»ùÓÚC++µÄCBeacon£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔWindowsϵͳ£»£»£»£»£»£»£»£»»ùÓÚGoµÄGoBeacon£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔLinuxºÍMacϵͳ¡£¡£¡£ZuoRAT»¹¿ÉÒÔ¼à¿ØDNSºÍHTTPSÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬£¬À´Ð®ÖÆÇëÇó²¢Ê¹ÓÃÌìÉúµÄÔ¤Éè¹æÔò½«Ä¿µÄÖØ¶¨Ïòµ½¶ñÒâÓò£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÌÈÅȡ֤ÆÊÎö¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-zuorat-malware-targets-soho-routers-in-north-america-europe/
6¡¢SymantecÐû²¼¹ØÓÚ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ
6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SymantecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ¡£¡£¡£Í¨Ì«¹ýÎö×î½üÉæ¼°BumblebeeµÄ¹¥»÷ÖÐʹÓÃµÄÆäËüÈý¸ö¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«ÆäÓëConti¡¢QuantumºÍMountlocker ÔÚÄÚµÄÐí¶àÀÕË÷ÍÅ»ïÁªÏµÆðÀ´¡£¡£¡£Æ¾Ö¤ÕâЩ½ÏÔçµÄ¹¥»÷ÖÐʹÓõÄTTPsÍÆ²â£¬£¬£¬£¬£¬£¬£¬£¬Bumblebee¿ÉÄÜÊÇ×÷ΪTrickbotºÍBazarLoaderµÄÌæ»»¼ÓÔØ³ÌÐòÍÆ³öµÄ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ±»ÊÓ²ìµÄ¹¥»÷µÄÁíÒ»¸öÅäºÏµãÊÇÕýµ±Èí¼þʹÓõÄÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬ConnectWise¡¢Atera¡¢SplashtopºÍAnyDeskµÈÔ¶³Ì×ÀÃæ¹¤¾ß¾³£·ºÆðÔÚ´ËÀ๥»÷ÖС£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime


¾©¹«Íø°²±¸11010802024551ºÅ