¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190308
Ðû²¼Ê±¼ä 2019-03-08
ÔÎÄÁ´½Ó£º
https://securelist.com/financial-cyberthreats-in-2018/89788/2¡¢ÐÂÍøÂçÌØ¹¤×éÖ¯Whitefly£¬£¬£¬£¬£¬ÓëÐÂ¼ÓÆÂ¶à¸ö¹¥»÷»î¶¯ÓйØ
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore3¡¢Ñо¿ÍŶӷ¢Ã÷2Ô·ÝÀÕË÷Èí¼þShadeµÄ¹¥»÷»î¶¯ìÉý

Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷ÀÕË÷Èí¼þTroldesh£¨ÓÖÃûShade£©ÔÚ2018ÄêQ4µ½2019ÄêQ1ʱ´úµÄ¼ì²âÊýÄ¿¼±¾çÔöÌí¡£¡£¡£¡£¡£¡£¡£Shadeͨ³£Í¨¹ý´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬Æä¸½¼þÊǰüÀ¨Javascript¾ç±¾µÄzipÎļþ¡£¡£¡£¡£¡£¡£¡£ShadeµÄÖ÷Òª¹¥»÷Ä¿µÄÊÇWindowsϵͳ£¬£¬£¬£¬£¬Æä½ÓÄÉAES 256 CBCËã·¨¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£²¿·ÖShadeµÄ±äÖÖ±£´æÃâ·ÑµÄ½âÃܹ¤¾ß£¬£¬£¬£¬£¬Óû§¿ÉÔÚNoMoreRansom.orgÍøÕ¾ÉÏÕÒµ½ËüÃÇ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/4¡¢Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack API¾ÙÐÐͨѶµÄSLUBºóÃÅ

Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack APIͨѶµÄ¶ñÒâÈí¼þSLUBºóÃÅ¡£¡£¡£¡£¡£¡£¡£SLUBÊÇÒ»¸öÓÃC++±àдµÄ×Ô½ç˵ºóÃÅ£¬£¬£¬£¬£¬Æä°üÀ¨¾²Ì¬Á´½Ó¿âcurl£¨ÓÃÓÚÖ´ÐÐHTTPÇëÇ󣩡¢boost£¨ÓÃÓÚ´ÓgistƬ¶ÏÖÐÌáÈ¡ÏÂÁºÍJsonCpp£¨ÓÃÓÚÆÊÎöslackͨѶ£©¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýË®¿Ó¹¥»÷Èö²¥£¬£¬£¬£¬£¬²¢ÇÒʹÓÃÁË΢ÈíÔÚ2018Äê5ÔÂÐÞ¸´µÄVBScriptÒýÇæÎó²î£¨CVE-2018-8174£©¾ÙÐÐѬȾ¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ»¹»á´ÓGithubÉÏÏÂÔØÒ»¸öÌØ¶¨µÄgistƬ¶Ï²¢ÌáÈ¡Ïà¹ØÏÂÁî¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/5¡¢ÐÂľÂíPirate Matryoshka£¬£¬£¬£¬£¬Ê¹Óú£µÁÍå¾ÙÐзַ¢

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷¹¥»÷ÕßʹÓú£µÁÍå·Ö·¢ÐÂľÂíPirate Matryoshka¡£¡£¡£¡£¡£¡£¡£¸ÃľÂíαװ³ÉÆÆ½âÈí¼þµÄ×°ÖÃÎļþ£¬£¬£¬£¬£¬µ±Óû§ÔËÐиÃÎļþʱ£¬£¬£¬£¬£¬½«»áÏÔʾһ¸öαÔìµÄº£µÁÍåµÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÕË»§ÃûºÍÃÜÂ룬£¬£¬£¬£¬¹¥»÷Õ߾ͻáÐ®ÖÆÓû§µÄÕË»§²¢ÉÏ´«¸ü¶àµÄ¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬×°ÖÃÎļþ»¹Ä¬ÈÏÀ¦°óÁËÆäËüÈí¼þ£¬£¬£¬£¬£¬ÆäÖÐÎå·ÖÖ®Ò»ÊÇ¹ã¸æÈí¼þ¡¢Ð®ÖÆä¯ÀÀÆ÷Ö÷Ò³µÄ¶ñÒâÈí¼þÒÔ¼°Ä¾ÂíµÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.kaspersky.com/blog/pirate-matryoshka-malware/25905/6¡¢Ë¼¿ÆÐÞ¸´Nexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î
˼¿Æ±¾ÖÜÐÞ¸´ÁËNexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨DoS¡¢í§Òâ´úÂëÖ´ÐкÍȨÏÞÌáÉýµÈ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËTetration AnalyticsÊðÀí¡¢LDAP¡¢Óû§ÕÊ»§ÖÎÀí½çÃæ¡¢ÏÂÁîÐнçÃæ£¨CLI£©µÈ×é¼þ£¬£¬£¬£¬£¬¶à¸öÎó²î¿ÉÔÊÐíÍâµØ¹¥»÷Õß¾ÙÐÐÌáȨ¡¢ÒÔrootÉí·ÝÖ´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ¡¢»ñÈ¡Ö÷ÒªÉèÖÃÎļþµÄ»á¼ûȨÏÞ»ò¾ÙÐÐÊÜÏÞshellÌÓÒÝ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ë¼¿Æ»¹½¨ÒéÓû§½ÓÄɲ½·¥±£»£»£»£»£»¤°²ÅÅÁËPOAPµÄÍøÂç»ò½ûÓøù¦Ð§¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82120/breaking-news/cisco-nexus-flaws-2.htmlÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí