¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£»£»£»£»Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔÓÉÊÇAWS APIÃÜÔ¿±»µÁ£»£»£»£»NemtyµÄ½âÃܹ¤¾ß
Ðû²¼Ê±¼ä 2019-10-12
°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©Ðû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¸ÄÏÐðÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµ¿ÉÒÔ½ÓÄÉÄÄЩ²½·¥À´±£»£»£»£»¤×Ô¼ºÃâÊÜË𺦡£¡£¡£¸ÃÖ¸ÄÏרΪÖÐСÐÍÆóÒµÉè¼Æ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʹÆäÏàʶ¡¢½ÓÄÉÐж¯²¢ÔöÇ¿ÆäÍøÂçÇå¾²·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÒÔÓ¦¶ÔÒ»Ö±Éú³¤µÄÍøÂçÇå¾²Íþв¡£¡£¡£¸ÃÖ¸ÄÏÏÈÈÝÁ˶ñÒâÈí¼þ¡¢´¹ÂÚÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬£¬£¬£¬£¬£¬£¬»¹Ã¶¾ÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À²½·¥¡£¡£¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÎÞ·¨°ü¹ÜÄܹ»ÖØÐ»ñµÃ»á¼ûȨ£»£»£»£»½¨ÒéÆóÒµ½ÓÄÉ×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥£»£»£»£»½¨ÒéÔÚÖ°Ô±ºÍÁ÷³ÌÖнÓÄÉ»á¼û¿ØÖÆ¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ£»£»£»£»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄÇå¾²ÊõÓï´Ê»ã±í¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾
ConfiantÇå¾²Ñо¿Ö°Ô±Taha Karim·¢Ã÷Õë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬µ«ÆäʱÑо¿Ö°Ô±Ö»·¢Ã÷Á˶ñÒâpayload Shlayer¡£¡£¡£ÔÚÁ½ÖÜǰÐû²¼µÄÒ»·ÝºóÐø±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ·¢Ã÷ÁËShlayerѬȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£¡£¡£ÏÖÔÚÖ»ÖªµÀShlayerÔÚÊÜѬȾµÄÖ÷»úÉÏÏÂÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬£¬£¬£¬£¬£¬£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£È»ºóTarmac½«ÆÚ´ýÐÂÏÂÁ£¬£¬£¬£¬£¬£¬¿ÉÊÇÓÉÓÚC2ЧÀÍÆ÷²»¿ÉÓ㬣¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨È·¶¨ÆäËùÓй¦Ð§¡£¡£¡£¸Ã¶ñÒâ»î¶¯Ö÷ÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/3¡¢·¸·¨ÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER

ƾ֤FireEyeµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÌí¼ÓÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£¡£¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеÄÊÍ·ÅÆ÷£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆÊÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐÓõÄÖ¤ÊéÊðÃûµÄ¡£¡£¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬£¬£¬£¬£¬£¬£¬°üÀ¨CARBANAKºóÃźÍRDFSNIFFER¡£¡£¡£RDFSNIFFER¿ÉÒÔʹ¹¥»÷Õß¼àÊӺ͸Ķ¯Í¨¹ýNCR¹«Ë¾µÄRDFClient½¨ÉèµÄÕýµ±ÅþÁ¬¡£¡£¡£Ñо¿Ö°Ô±×Ü½á³ÆÐ¹¤¾ßºÍÊÖÒÕµÄÒýÈëÅú×¢FIN7ÕýÔÚÒ»Ö±Éú³¤ÒÔ˳ӦÇå¾²ÐÔÒ»Ö±ÔöÇ¿µÄÇéÐΡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔÓÉÊÇAWS APIÃÜÔ¿±»µÁ
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/
5¡¢Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß
TesorionÑо¿Ö°Ô±½¨ÉèÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉÏÊÂÇéµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£¡£¡£ÏÖÔÚ½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÄ¿µÄÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬·Ç±ê×¼ÎļþÃûÌõļÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬£¬£¬£¬£¬£¬£¬µ«TesorionÌìÌì¶¼ÔÚ¼ÌÐøÖ§³ÖеÄÎļþÀàÐÍ¡£¡£¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬£¬£¬£¬£¬£¬£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄЧÀÍÆ÷ÉÏÍê³É½âÃÜÃÜÔ¿µÄÌìÉú£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏִ˾ÙÊÇΪÁ˱ÜÃâÀÕË÷Èí¼þ¿ª·¢Ö°Ô±ÆÊÎö½âÃܳÌÐò²¢ÏàʶÆäËã·¨µÄÎó²îËùÔÚ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/
6¡¢SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒªº¦Îó²î
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html