ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶
Ðû²¼Ê±¼ä 2021-01-071.ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷
ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/
2.Intezer·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦ÓÃ
Intezer Labs·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Óᣡ£¡£¡£¸Ã»î¶¯ÔçÔÚ2020Äê1ÔÂ8ÈÕ¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÔÚ2020Äê12Ô²ű»·¢Ã÷¡£¡£¡£¡£ºÚ¿ÍÖ÷ÒªÒÀÀµÓÚÈý¸öÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄÓ¦ÓÃJamm¡¢eTrade/KintumºÍDaoPokerÀ´·Ö·¢¶ñÒâÈí¼þElectroRAT¡£¡£¡£¡£ElectroRAT¾ßÓм«Ç¿µÄÇÖÈëÐÔ£¬£¬£¬£¬£¬£¬£¬¾ßÓмüÅ̼ͼ¡¢½ØÍ¼¡¢ÉÏ´«Îļþ¡¢ÏÂÔØÎļþÒÔ¼°ÔÚÄ¿µÄ¿ØÖÆÌ¨ÉÏÖ´ÐÐÏÂÁîµÈ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ¿ÉÄÜÒѾѬȾÁËԼĪ6500¸öÓû§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-target-cryptocurrency-users-with-new-electrorat-malware/
3.°ÄÕþ¸®ÖÒÑÔ·¸·¨ÍÅ»ïð³äÆäÍøÂçÇå¾²ÖÐÐÄ·Ö·¢¶ñÒâÈí¼þ
°Ä´óÀûÑÇÕþ¸®ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïð³ä°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¸ÃÍÅ»ïÓÕʹÊܺ¦Õß×°ÖÃÔ¶³ÌÖÎÀíºÍ×ÀÃæ¹²ÏíÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÓû§µÄÒøÐÐÐÅÏ¢¡£¡£¡£¡£ÆäÊ×ÏÈʹÓÃαװ³ÉACSC¹Ù·½ÐÂÎŵĵç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬¼û¸æÊܺ¦ÕßµçÄÔÒѾ±»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÐèҪͨ¹ý¶ñÒâÁ´½ÓÏÂÔØ¼ÙµÄɱ¶¾Èí¼þ¡£¡£¡£¡£Ò»µ©Óû§ÏÂÔØ²¢Æô¶¯ºó£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í¿ÉÄܽÓÊÜÆäÅÌËã»ú²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬¸ÃÍŻﻹ»áʹÓÃαÔìµÄµç»°ºÅÂë¸øÊܺ¦Õß´òµç»°£¬£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇÏÂÔØTeamViewer»òAnyDeskÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/australian-cybersecurity-agency-used-as-cover-in-malware-campaign/
4.Check PointÐû²¼Õë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ
Check PointÐû²¼ÁËÕë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬×Ô2020Äê11ÔÂ1ÈÕÒÔÀ´È«ÇòÕë¶ÔÒ½ÁÆÐÐÒµµÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÁè¼Ý45£¥£¬£¬£¬£¬£¬£¬£¬¶øÕë¶ÔÆäËûÐÐÒµµÄ¹¥»÷ƽ¾ùÔöÌíÁË22£¥£»£»£»ÔÚ11ÔÂÿ¸ö×é֯ƽ¾ùÿÖÜÔâµ½626´Î¹¥»÷£»£»£»Éæ¼°µ½ÀÕË÷Èí¼þ¡¢½©Ê¬ÍøÂç¡¢Ô¶³Ì´úÂëÖ´ÐкÍDDoSµÄ¹¥»÷ÔÚ11Ô·ݶ¼ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷µÄÔöÌí×îΪÏÔ×Å£»£»£»¹¥»÷ÖÐʹÓõÄÖ÷ÒªÀÕË÷Èí¼þÊÇRyuk£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇSodinokibi¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/01/05/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again/
5.ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý²¢³ÆÓû³öÊÛ¸ü¶à
ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢³ÆÓû³öÊÛ¸ü¶àExpress¡¢SantanderºÍBanamexÒøÐпͻ§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£´Ë´Îй¶µÄ10000Ìõ¼Í¼°üÀ¨ÍêÕûµÄÃÀ¹úExpressÐÅÓÿ¨ºÅºÍ¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÐԱ𣬣¬£¬£¬£¬£¬£¬¿ÉÊDz¢Ã»ÓÐÐÅÓÿ¨µÄµ½ÆÚÈÕÆÚ¡¢ÃÜÂë»òÃô¸ÐµÄ²ÆÎñÊý¾Ý¡£¡£¡£¡£Âô·½ÌåÏÖ²¢²»³öÊÛÃÜÂëºÍÉí·ÝÖ¤ºÅµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý½ö»á±»ÓÃÓÚÀ¬»øÓʼþ»òÓªÏú¹ã¸æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-posts-data-of-10-000-american-express-accounts-for-free/
6.NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶
NISSAN±±ÃÀ·Ö¹«Ë¾ÒòÔÚBitbucket GitЧÀÍÆ÷ÖÐʹÓÃÁËĬÈÏÆ¾Ö¤admin/admin£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÒÆ¶¯Ó¦ÓóÌÐòºÍÄÚ²¿¹¤¾ßµÄÔ´´úÂëй¶¡£¡£¡£¡£´Ë´Îй¶µÄÔ´´úÂë°üÀ¨ÈÕ²úNA MobileÓ¦Óá¢ÈÕ²úASISTÕï¶Ï¹¤¾ßµÄijЩ²¿·Ö¡¢¾ÏúÉÌӪҵϵͳ/¾ÏúÉÌÃÅ»§¡¢ÈÕ²úÄÚ²¿½¹µãmobile library¡¢ÈÕ²ú/Ó¢·ÆÄáµÏNCAR/ICARЧÀÍ¡¢¿Í»§»ñÈ¡ºÍ±£´æ¹¤¾ß¡¢ÏúÊÛ/Êг¡Ñо¿¹¤¾ß+Êý¾Ý¡¢ÖÖÖÖÓªÏú¹¤¾ß¡¢³µÁ¾ÎïÁ÷ÃÅ»§¡¢³µÁ¾ÁªÍøÐ§ÀÍ/ÈÕ²úÁªÍø¡¢ÒÔ¼°ÆäËüÖÖÖÖºó¶ËºÍÄÚ²¿¹¤¾ßµÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/nissan-source-code-leaked-online-after-git-repo-misconfiguration/