TAC-040ʹÓÃConfluenceÎó²î×°ÖÃLjl Backdoor
Ðû²¼Ê±¼ä 2022-08-09
¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Deepwatch·¢Ã÷TAC-040ÍÅ»ïʹÓÃAtlassian ConfluenceÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ5Ô£¬£¬£¬£¬£¬£¬£¬²¢Ò»Á¬ÁË7Ì죬£¬£¬£¬£¬£¬£¬Í¨¹ý¶ÔÍøÂçÈÕÖ¾µÄÆÊÎöÅú×¢TAC-040ÒÑÔÚÄ¿µÄϵͳÖÐÇÔÈ¡ÁËÔ¼700MBÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÒÉËÆ±»Ê¹ÓõÄÎó²îÊǹ¤¾ßͼµ¼º½ÓïÑÔ(OGNL)×¢ÈëÎó²î£¨CVE-2022-26134£©£¬£¬£¬£¬£¬£¬£¬ÒÑÔÚ2022Äê6ÔÂ4ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯·Ö·¢ÁËкóÃÅLjl Backdoor£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔÍøÂçÎļþºÍÓû§ÕÊ»§¡¢¼ÓÔØí§Òâ.NET payload²¢ÍøÂçϵͳÐÅÏ¢¼°Ä¿µÄµØÀíλÖᣡ£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html
2¡¢Î¢Èí³ÆÆä×îа汾ijЩWindowsϵͳ±£´æÊý¾ÝËð»µÎÊÌâ
΢Èí¹«Ë¾ÔÚ8ÔÂ8ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬Ö§³Ö×îÐÂʸÁ¿¸ß¼¶¼ÓÃܱê×¼(AES)(VAES)Ö¸ÁµÄWindows×°±¸¿ÉÄÜÈÝÒ×Êܵ½Êý¾ÝË𻵵ÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Ê¹ÓÃ×îд¦Öóͷ£Æ÷µÄWindows×°±¸ÔÚWindows 11ºÍWindows Server 2022±£´æÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÊÜ´ËÎÊÌâÓ°ÏìµÄ×°±¸ÔÚÐÂÓ²¼þÉÏʹÓÃAES-XTS»òAES-GCM·Ö×éÃÜÂëģʽ¡£¡£¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ìáµ½ÁËÊÜÓ°ÏìϵͳµÄ»á±£´æÊý¾ÝɥʧΣº¦£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Ïêϸ˵Ã÷»á±¬·¢Ê²Ã´£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÒÑÔÚ5ÔÂ24ÈÕºÍ6ÔÂ14ÈÕÐû²¼µÄÔ¤ÀÀ°æºÍÇå¾²°æÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¸üÐÂÒ²»á¶ÔÐÔÄÜÔì³ÉÓ°Ï죬£¬£¬£¬£¬£¬£¬Î¢Èí½¨Òé±£´æÐÔÄÜϽµÎÊÌâµÄÓû§×°ÖÃ6ÔÂ23ÈÕµÄÔ¤ÀÀ¸üлò7ÔÂ12ÈÕµÄÇå¾²¸üС£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-devices-with-newest-cpus-are-susceptible-to-data-damage/
3¡¢Lazarusð³äCoinbase¶Ô½ðÈڿƼ¼ÐÐÒµ¾ÙÐд¹ÂÚ¹¥»÷
ýÌå8ÔÂ7Èճƣ¬£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍÍÅ»ïLazarusð³äCoinbase¶Ô½ðÈڿƼ¼ÐÐÒµ¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÔڸûÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßð³äÀ´×ÔCoinbaseÕÐÆ¸²úÆ·Çå¾²¹¤³Ì˾Àí¡£¡£¡£¡£¡£¡£¡£¡£ÓÕ¶üÊǹØÓÚÊÂÇéְλµÄPDFÎļþCoinbase_online_careers_2022_07.exe£¬£¬£¬£¬£¬£¬£¬ÕâÏÖʵÉÏÊÇʹÓÃÁËPDFͼ±êµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬»áÔÚÏÔʾÓÕ¶üPDFµÄͬʱ¼ÓÔØ¶ñÒâDLL¡£¡£¡£¡£¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ½«Ê¹ÓÃGitHub×÷ΪC2À´ÎüÊÕÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÇ鱨²¿·ÖÔøÌáÐÑ£¬£¬£¬£¬£¬£¬£¬Lazarus»áÈö²¥Ä¾Âí»¯¼ÓÃÜÇ®±ÒÇ®°üºÍͶ×ÊÓ¦ÓÃÀ´ÇÔȡĿµÄµÄ×ʲú¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-target-crypto-experts-with-fake-coinbase-job-offers/
4¡¢Ahnlab·¢Ã÷Ö÷ÒªÕë¶Ôº«¹úµÄÐÂÀÕË÷Èí¼þGwisinLocker
AhnlabÔÚ8ÔÂ3ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öеÄÀÕË÷Èí¼þ¼Ò×åGwisinLocker£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úµÄÒ½ÁƱ£½¡¡¢¹¤ÒµºÍÖÆÒ©ÐÐÒµ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þȪԴÓÚGwisinÍŻ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Ç¡·êº«¹ú¹«ÖÚ¼ÙÆÚºÍÆÆÏþ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÍƶϹ¥»÷ÕßÉîÖªº«¹úÎÄ»¯ºÍÉÌҵϰ¹ß¡£¡£¡£¡£¡£¡£¡£¡£¼ÓÃÜWindowsϵͳʱ£¬£¬£¬£¬£¬£¬£¬Ñ¬È¾Ê¼ÓÚÖ´ÐÐMSI×°ÖÃÎļþ£¬£¬£¬£¬£¬£¬£¬ÐèÒªÌØÊâµÄÏÂÁîÐвÎÊýÀ´×¼È·¼ÓÔØ×÷ΪÀÕË÷Èí¼þ¼ÓÃÜÆ÷µÄǶÈëʽDLL£»£»£»£»¶øLinux°æ±¾ÖУ¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÆ÷×ÅÖØÓÚ¼ÓÃÜVMware ESXiÐéÄâ»ú£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁË´øÓÐSHA256 hashingµÄAES¶Ô³ÆÃÜÔ¿¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£
https://asec.ahnlab.com/en/37483/
5¡¢¹¥»÷ÕßÓÃÃÀ¹úÔËͨµÈÕýµ±ÓòµÄ¿ª·ÅÖØ¶¨ÏòÎó²î¹¥»÷M365Óû§
¾Ý8ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÀÄÓÃÕýµ±Óò£¨SnapchatºÍÃÀ¹úÔËͨ£©ÉϵĿª·ÅÖØ¶¨ÏòÎó²îÀ´ÇÔÈ¡Microsoft 365Óû§µÄƾ֤¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ½ñÄê5ÔÂÖÐÑ®µ½7ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÊÜÐÅÈÎ×éÖ¯ºÍÍøÕ¾µÄÓò×÷ΪÔÝʱµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼ò»¯´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÕâÁ½¸ö°ëÔÂÄÚ£¬£¬£¬£¬£¬£¬£¬Inky¼ì²âµ½´ÓGoogle WorkspaceºÍMicrosoft 365·¢Ë͵Ä6812·â´¹ÂÚÓʼþÖÐʹÓÃÁËSnapchat¿ª·ÅÖØ¶¨ÏòÎó²î£¬£¬£¬£¬£¬£¬£¬2029·â´¹ÂÚÓʼþʹÓÃÁËamericanexpress[.]comÖØ¶¨ÏòÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/134131/cyber-crime/snapchat-amex-open-redirects-phishing.html
6¡¢CiscoÐû²¼¹ØÓÚC2aaSƽ̨Dark UtilitiesµÄÆÊÎö±¨¸æ
8ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬Cisco TalosÐû²¼Á˹ØÓÚC2¼´Ð§ÀÍ£¨C2aaS£©Æ½Ì¨Dark UtilitiesµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£Dark UtilitiesÓÚ2022ÄêÍ·Ðû²¼£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»¸öΪ¹¥»÷ÕßÌṩȫ¹¦Ð§C2µÄƽ̨£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÄ¿µÄϵͳÉϾÙÐÐÔ¶³Ì»á¼û¡¢ÏÂÁîÖ´ÐС¢ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷ºÍ¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÏÖÔÚÖ§³Ö»ùÓÚWindows¡¢LinuxºÍPythonµÄpayload£¬£¬£¬£¬£¬£¬£¬²¢ÍйÜÔÚÐǼÊÎļþϵͳ(IPFS)ÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÕë¶Ô¶àÖּܹ¹¾ÙÐй¥»÷¶øÎÞÐè´ó×Ú¿ª·¢×ÊÔ´¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬×ԸöñÒâÈí¼þÐû²¼ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÒÑÔÚÒ°¼ì²âµ½Ëü±»ÓÃÀ´¾ÙÐÐÔ¶³Ì»á¼ûºÍÍÚ¿óµÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£
https://blog.talosintelligence.com/2022/08/dark-utilities.html


¾©¹«Íø°²±¸11010802024551ºÅ