ÖÇÀû½ðÈÚÊг¡Î¯Ô±»áExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC£»£»£»£»£»£»£»SentinelOne·¢Ã÷Õë¶ÔiOS¿ª·¢Ö°Ô±µÄ¹©Ó¦Á´¹¥»÷»î¶¯
Ðû²¼Ê±¼ä 2021-03-191.ÖÇÀû½ðÈÚÊг¡Î¯Ô±»áExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC
ÖÇÀû½ðÈÚÊг¡Î¯Ô±»á£¨CMF£©³ÆÆäExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC¡£¡£¡£¡£¡£CMFÊôÓÚÖÇÀû²ÆÎñ²¿£¬£¬£¬£¬£¬£¬£¬ÊÇÖÇÀûÒøÐкͽðÈÚ»ú¹¹µÄî¿ÏµÕߺͼì²éÔ±¡£¡£¡£¡£¡£CMFÓÚ3ÔÂ17ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÅû¶µÄMicrosoft ExchangeЧÀÍÆ÷ÖеÄProxyLogonÎó²î×°ÖÃWeb Shell²¢ÊÔͼÇÔȡƾ֤֮ºó¡£¡£¡£¡£¡£ÎªÁË×ÊÖúÑо¿Ö°Ô±ºÍÆäËûMicrosoft ExchangeÖÎÀíÔ±£¬£¬£¬£¬£¬£¬£¬CMF»¹Ðû²¼ÁËWeb ShellµÄIOCºÍÔÚÔâµ½¹¥»÷µÄЧÀÍÆ÷ÉÏÕÒµ½µÄÅú´¦Öóͷ£Îļþ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/chiles-bank-regulator-shares-iocs-after-microsoft-exchange-hack/
2.SentinelOne·¢Ã÷Õë¶ÔiOS¿ª·¢Ö°Ô±µÄ¹©Ó¦Á´¹¥»÷»î¶¯
Çå¾²¹«Ë¾SentinelOne·¢Ã÷ÁËÐµĹ©Ó¦Á´¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÃûΪXcodeSpyµÄ¶ñÒâXcodeÏîÄ¿Õë¶ÔiOS¿ª·¢Ö°Ô±¡£¡£¡£¡£¡£XcodeÊÇApple½¨ÉèµÄ¼¯³É¿ª·¢ÇéÐΣ¨IDE£©£¬£¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±¿ÉʹÓÃÆä½¨ÉèmacOS¡¢iOS¡¢tvOSºÍwatchOSÓ¦ÓóÌÐò¡£¡£¡£¡£¡£Ôڸù¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿Ë¡ÁËÕýµ±µÄTabBarInteractionÏîÄ¿£¬£¬£¬£¬£¬£¬£¬²¢Ìí¼ÓÁËÄ£ºýµÄ¶ñÒâRun¾ç±¾XcodeSpy£¬£¬£¬£¬£¬£¬£¬ÒÔ½«¹¥»÷ÕßµÄC2ЧÀÍÆ÷ÅþÁ¬µ½¿ª·¢Ö°Ô±µÄÏîÄ¿¡£¡£¡£¡£¡£XcodeSpyÓÚ9ÔÂ4ÈÕÊ״α»ÉÏ´«µ½VirusTotal£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÏÓÒÉÕâÊǹ¥»÷ÕßΪ²âÊÔ¼ì²âÂʶø×Ô¼ºÉÏ´«µÄÑù±¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-xcodespy-malware-targets-ios-devs-in-supply-chain-attack/
3.Ñо¿Ö°Ô±·¢Ã÷Ö¼ÔÚÇÔÈ¡5GÏà¹ØÊÖÒÕµÄDi¨¤nx¨´nÐж¯
Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔµçÐŹ«Ë¾µÄDi¨¤nx¨´nÐж¯£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡5GÊÖÒÕÏà¹ØµÄÃô¸ÐÊý¾ÝºÍÉÌÒµÉñÃØ¡£¡£¡£¡£¡£ÔÚ²¿·Ö¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í´î½¨ÁËÒ»¸öαÔì³É»ªÎªÖ°ÒµÒ³ÃæµÄÐéÎ±ÍøÕ¾¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯ËùʹÓõÄÕ½Êõ¡¢ÊÖÒպͳÌÐò£¨TTP£©ÓëAPT×éÖ¯RedDeltaºÍÒ°Mustang PandaµÄÐж¯ÏàËÆ¡£¡£¡£¡£¡£McAfee ATRÍŶÓÌåÏÖ×î³õµÄѬȾǰÑÔÉв»ÍêÈ«ÇåÎú£¬£¬£¬£¬£¬£¬£¬µ«ÆäÍÆ²âºÚ¿Í¿ÉÄÜʹÓô¹ÂÚÍøÕ¾À´·Ö·¢¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹¥»÷µÄµÚ¶þ½×¶ÎʹÓûùÓÚFlashµÄ¹¤¼þ¶ñÒâÈí¼þÔÚÊܺ¦ÕßµÄϵͳÉÏÖ´ÐÐ.NET¸ºÔØ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115693/apt/chinese-hackers-5g.html
4.ŦԼÖݶà¸öÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êý¾Ý»òÒÑй¶
ŦԼÖݵݶû°ÍÄá¡¢ÈøÀÍмӺÍÂ×˹ÀÕµÈÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êý¾Ý»òÒÑй¶¡£¡£¡£¡£¡£°Â¶û°ÍÄáÏØ¾¯³¤°ì¹«ÊÒÌåÏÖ¹¥»÷±¬·¢ÔÚ±¾ÖܶþÍíÉÏ9µã30·Ö×óÓÒ£¬£¬£¬£¬£¬£¬£¬ÌØÀïÏØ¹«¹²Çå¾²ÍøÂçѬȾÁËÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˶à¸öÏØ³Ç¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬£¬Computer Aidedµ÷Àí£¨CAD£©Ð§ÀÍÊܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬£¬ÆäÕýÔÚͨ¹ý±¸·Ý¾ÙÐÐÖØÐÞ¡£¡£¡£¡£¡£¸ÃÏØ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ±¸ÓÃϵͳÈÔÕý³£ÔËÐв¢ÇÒ¿ÉÒÔΪÌṩ911ЧÀÍ£¬£¬£¬£¬£¬£¬£¬¿ÉÊDz¿·ÖÊý¾Ý¿ÉÄÜÒѾй¶¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.news10.com/news/tri-county-sheriff-dispatch-hit-with-ransomware-attack/
5.ÈÕ¾ÖйúÏã¸Û·Ö¹«Ë¾³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢¿ÉÄÜй¶
ÈÕ¾(Nikkei)±¾ÖÜÈýÌåÏÖÆäÖйúÏã¸Û·Ö¹«Ë¾Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ2020Äê10Ô£¬£¬£¬£¬£¬£¬£¬¸Ã·Ö¹«Ë¾µÄ²¿·Öµç×ÓÓʼþÕË»§Ô⵽δ¾ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£ÈÕ¾¹ú¼Ê°æ¡¢ÍøÂç°æºÍÈÕ¾ÑÇÖÞ°æ¡¢ÈÕ¾ÖйúµÄÍâÑó¶©»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѾй¶£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¹«Ë¾Ãû³Æ¡¢µØµãºÍµç»°ºÅÂ룬£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÈÕ¾Öйú¹«Ë¾Òѽ«´ËÊÂÎñ±¨¸æ¸øÏã¸ÛµÄСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»£»£»£»¤Õþ¸®¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://asia.nikkei.com/Business/Companies/Nikkei-s-Hong-Kong-affiliate-hit-by-unauthorized-access
6.Unit42Ðû²¼2021ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ
Unit42Ðû²¼ÁË2021ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÆÀ¹ÀÀÕË÷Èí¼þ¹¥»÷µÄ¹æÄ£²¢Ìṩ¿É½µµÍΣº¦µÄ²Ù×÷°ì·¨¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÊê½ð´Ó2019ÄêµÄ115123ÃÀÔªÔöÌíµ½2020ÄêµÄ312493ÃÀÔª£¬£¬£¬£¬£¬£¬£¬×î¸ßÊê½ð´Ó1500ÍòÃÀÔªÔöÌíµ½3000ÍòÃÀÔª£»£»£»£»£»£»£»ºÚ¿ÍÖ÷ÒªÕë¶ÔÒ½ÁƱ£½¡²¿·Ö£»£»£»£»£»£»£»Ë«ÖØÀÕË÷µÄÇéÐÎÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬Áè¼Ý16ÖÖ²î±ðµÄÀÕË÷Èí¼þ±äÖÖ¶¼ÔÚʹÓÃÕâÖÖÒªÁ죬£¬£¬£¬£¬£¬£¬ÆäÖÐNetwalkerÕ¼±È×î´ó£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÒ»°Ù¶àÃûÊܺ¦ÕßµÄÐÅÏ¢¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/ransomware-threat-assessments/