ºÚ¿ÍʹÓô¹Âڻ·Ö·¢Î±×°³ÉKaseya VSAÇå¾²¸üеĺóÃÅ£»£»£»£»£»£»£»Cisco Talos·¢Ã÷APT×éSideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹

Ðû²¼Ê±¼ä 2021-07-09

1.ºÚ¿ÍʹÓô¹Âڻ·Ö·¢Î±×°³ÉKaseya VSAÇå¾²¸üеĺóÃÅ


1.jpg


MalwarebytesÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍÕýʹÓô¹Âڻ·Ö·¢Î±×°³ÉKaseya VSAÇå¾²¸üеÄCobalt StrikeºóÃÅ¡£¡£¡£¡£´Ë´Î»î¶¯ÖеĶñÒâÓʼþ°üÀ¨Ò»¸öÃûΪSecurityUpdates.exeµÄ¸½¼þ£¬ £¬£¬£¬£¬£¬ÒÔ¼°Ò»¸öαװ³É΢ÈíÇå¾²¸üеÄÁ´½Ó¡£¡£¡£¡£ÏÖÔÚËäÈ»Malwarebytes»¹Ã»ÓÐÈ·¶¨´Ë´Î´¹Âڻ±³ºóµÄÄ¿µÄÊÇʲô£¬ £¬£¬£¬£¬£¬µ«ÓÐȤµÄÊÇ£¬ £¬£¬£¬£¬£¬Õâ¸öCobalt Strike payloadÍйÜÔÚÒ»¸öÖ¼ÔÚ·Ö·¢DridexÒøÐÐľÂíµÄ»î¶¯Ê¹ÓõÄIPµØµãÉÏ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-kaseya-vsa-security-update-backdoors-networks-with-cobalt-strike/


2.Cisco Talos·¢Ã÷APT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹


2.jpg


Cisco Talos·¢Ã÷ÁËAPT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃAPTÖÁÉÙ×Ô2019ÄêÒÔÀ´¾Í×îÏÈ»îÔ¾£¬ £¬£¬£¬£¬£¬ËƺõһֱרעÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£SideCopyµÄѬȾÁ´Ê¼ÓÚÒ»¸ö¶ñÒâLNKÎļþ£¬ £¬£¬£¬£¬£¬È»ºóÉæ¼°¶à¸öHTAºÍ¼ÓÔØ³ÌÐòDLLÒÔÌṩ×îÖÕµÄpayload¡£¡£¡£¡£Talos³Æ£¬ £¬£¬£¬£¬£¬SideCopyµÄ¹¥»÷»î¶¯ÒÑ´Ó×°ÖûùÓÚC#µÄCetaRAT¡¢AllakoreľÂíºÍnjRAT£¬ £¬£¬£¬£¬£¬À©Õ¹µ½Ê¹ÓÃ4¸öÐµĶ¨ÖÆÄ¾ÂíºÍ2¸öÉÌÓÃRATLilithºÍEpicenter¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/sidecopy-cybercriminals-use-custom-trojans-in-india-attacks/


3.Ñо¿Ö°Ô±·¢Ã÷ÊýÊ®¸öNuGetÈí¼þ°ü±£´æÒ×±»Ê¹ÓõÄÎó²î


3.jpg


ReversingLabsµÄÑо¿Ö°Ô±·¢Ã÷ÊýÊ®¸öNuGetÈí¼þ°ü±£´æÒ×±»Ê¹ÓõÄÎó²î¡£¡£¡£¡£NuGetÊÇMicrosoftÖ§³ÖµÄ.NETƽ̨»úÖÆ£¬ £¬£¬£¬£¬£¬×÷ΪÖÎÀíÆ÷£¬ £¬£¬£¬£¬£¬Ö¼ÔÚʹ¿ª·¢Ö°Ô±Äܹ»¹²Ïí¿ÉÖØÓõĴúÂë¡£¡£¡£¡£Ñо¿Ö°Ô±¶ÔÍйÜÔÚNuGet´æ´¢¿âÉϵÄÈí¼þ°üµÄ¾ÙÐÐÆÊÎö£¬ £¬£¬£¬£¬£¬·¢Ã÷ÓÐ51¸öÈí¼þ°üÒ×Êܵ½¸ßÑÏÖØÐÔÎó²îµÄ¹¥»÷£¬ £¬£¬£¬£¬£¬ÀýÈçÔ¶³ÌЧÀÍÆ÷ÎļþÖÎÀí¿âWinSCPHelper£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÁËWinSCP°æ±¾5.11.2£¬ £¬£¬£¬£¬£¬±£´æí§Òâ´úÂëÖ´ÐÐÎó²î(CVE-2021-3331)¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/07/dozens-of-vulnerable-nuget-packages.html


4.ÃÀ¹úÑÇÀ­°ÍÂíÖÝWiregrassµçÁ¦¹«Ë¾³ÆÔâµ½ÀÕË÷¹¥»÷


4.jpg


ÃÀ¹úÑÇÀ­°ÍÂíÖݵĵçÁ¦¹«Ë¾Wiregrass³ÆÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬ £¬£¬£¬£¬£¬ÆäÔÚÉÏÖÜÁù·¢Ã÷Á˴˴ι¥»÷£¬ £¬£¬£¬£¬£¬¸Ã¹¥»÷Ö»Ó°ÏìÁËһ̨ЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬µ¼ÖÂÆä¿Í»§ÔÝʱÎÞ·¨»á¼ûÕÊ»§£¬ £¬£¬£¬£¬£¬ÆäÕýÆð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£¿ÉÊÇÏÖÔÚÉÐδ·¢Ã÷±£´æÊý¾Ýй¶ÎÊÌ⣬ £¬£¬£¬£¬£¬¹©µçЧÀÍҲδÊܵ½Ó°Ï죬 £¬£¬£¬£¬£¬¶ø¸Ã¹«Ë¾Ã»Óа´ÒªÇóÖ§¸¶Êê½ð¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ£¬ £¬£¬£¬£¬£¬ÆäÔÚ¹¥»÷±¬·¢Ç°µÄÒ»ÖÜÉý¼¶ÁËÅÌËã»úϵͳ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/119827/cyber-crime/wiregrass-electric-cooperative-attack.html


5.Rapid7Ñо¿Ö°Ô±Åû¶Sage X3 ERPƽ̨ÖеĶà¸öÎó²î


5.jpg


Rapid7µÄÑо¿Ö°Ô±Åû¶Sage X3ÆóÒµ×ÊÔ´ÍýÏë(ERP)ƽ̨ÖеÄ4¸öÎó²î¡£¡£¡£¡£ÆäÖÐ×îΪÑÏÖØµÄÊÇÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2020-7388£©£¬ £¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ×î¸ßµÄNT AUTHORITY/SYSTEMÓû§È¨ÏÞÔÚЧÀÍÆ÷ÉÏÖ´ÐÐÏÂÁî¡£¡£¡£¡£ÆäËûΪÐÅϢй¶Îó²î£¨CVE-2020-7387£©¡¢Éí·ÝÑé֤ȱ·¦Îó²î£¨CVE-2020-7389£©ºÍ³¤ÆÚÐÔ¿çÕ¾¾ç±¾Îó²î£¨CVE-2020-7390£©¡£¡£¡£¡£ÆäÖУ¬ £¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃCVE-2020-7387ºÍCVE-2020-7388¿ÉÍêÈ«¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/critical-sage-x3-rce-bug-allows-full-system-takeovers/167612/


6.Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäÔâµ½¹¥»÷¿Í»§ÐÅϢй¶


6.jpg


Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäµÚÈý·½¹©Ó¦É̵ÄAccellion FTAÔâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£Morgan StanleyÊÇÒ»¼ÒÁìÏȵĽðÈÚЧÀ͹«Ë¾£¬ £¬£¬£¬£¬£¬ÔÚÈ«Çò¹æÄ£ÄÚÌṩͶ×ÊÒøÐС¢Ö¤È¯¡¢²Æ²úºÍͶ×ÊÖÎÀíЧÀÍ¡£¡£¡£¡£ÎªÆäÌṩÕË»§Î¬»¤Ð§À͵ũӦÉÌGuidehouseÓÚ2021Äê1Ô·ÝÔâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬²¢ÓÚ5Ô½«´ËÊÂ֪ͨÁËÕâ¼ÒͶ×ʹ«Ë¾¡£¡£¡£¡£´Ë´Îй¶ÐÅÏ¢°üÀ¨Æä¿Í»§µÄÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍ·¨È˹«Ë¾Ãû³ÆµÈ¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄһЩ¼ÓÃÜÎļþÁ¬Í¬½âÃÜÃÜÔ¿¶¼Ò»Æð±»µÁ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/morgan-stanley-reports-data-breach-after-vendor-accellion-hack/