ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬ £¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£¡£¡£¡£¡£¡£¡£8ÔÂ12ÈÕ£¬ £¬£¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬ £¬£¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬ £¬£¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£Í¬ÈÕ£¬ £¬£¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬 £¬£¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬ £¬£¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬ £¬£¬£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑÇסÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ôڴ˴λÖй¥»÷ÕßÌáÐÑÄ¿µÄÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬 £¬£¬£¬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍÉó²é¡£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§µã»÷Á´½Ó£¬ £¬£¬£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔAndroidÓû§£¬ £¬£¬£¬¾ßÓÐÇÔȡ֧¸¶¿¨ÏêϸÐÅÏ¢¡¢×èµ²¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢»á¼ûȨÏ޵ȹ¦Ð§¡£¡£¡£¡£¡£¡£¡£FlubotÔçÔÚ½ñÄêÄêÍ·¾Í¹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¼Ò£¬ £¬£¬£¬²¢ÔÚ±¾ÔÂ×îÏÈÕë¶Ô°Ä´óÀûÑÇÓû§¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸£¿£¿£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ£¬ £¬£¬£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬ £¬£¬£¬¹ú·À²¿ÍøÂç˾ÁÕýÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£¡£¡£¡£¡£¡£¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ£¬ £¬£¬£¬µ«ËüÔö²¹ËµÕâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÊǺÎʱ±»·¢Ã÷£¬ £¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬ £¬£¬£¬¹¥»÷¿ÉÄܱ¬·¢ÔÚ¼¸ÖÜǰ¡£¡£¡£¡£¡£¡£¡£¹úÎñÔº½²»°ÈËÌåÏÖ£¬ £¬£¬£¬ËûÃÇÕýÔÚ½ÓÄɲ½·¥ÒÔÈ·±£ÐÅÏ¢¿ÉÒÔÊܵ½±£»£»£»£»£»£»£»¤£¬ £¬£¬£¬²¢ÇÒ³öÓÚÇå¾²Ôµ¹ÊÔ­ÓÉÎÞ·¨ÌÖÂÛ¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨.png


CISAÐû²¼ÁËÓйؽüÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£¡£¡£¸Ã¾¯±¨Ö¸³ö£¬ £¬£¬£¬ÔÚÖØ´ó×ÔÈ»ÔÖÄÑÖ®ºó£¬ £¬£¬£¬°üÀ¨¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£»£»£»£»£»£»£»áºÜ³£¼û¡£¡£¡£¡£¡£¡£¡£×éÖ¯ºÍСÎÒ˽¼ÒÔÚ´¦Öóͷ£´øÓÐÓëì«·çÏà¹ØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱÐèҪСÐÄÉóÉ÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬»¹ÒªÐ¡ÐÄÓë±°ÁÓÌìÆøÊÂÎñÏà¹ØµÄÉ罻ýÌåÇëÇó¡¢Îı¾»òÏßÏ»¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ.jpg


Cisco TalosÐû²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬ÉÏÒ»¼¾¶È£¬ £¬£¬£¬ÀÕË÷Èí¼þÊ״β»ÔÙÕ¼ÓÐÖ÷ҪλÖ㬠£¬£¬£¬ÍƲâÕâ¿ÉÄÜÊÇÓÉMicrosoft Exchange Îó²îʹÓûµÄ´ó·ùÔöÌíµ¼ÖµÄ¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬ £¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬ £¬£¬£¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£©£¬ £¬£¬£¬ÓÖ³ÉΪ×î´óµÄÍþв¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬ £¬£¬£¬Ö÷ÒªµÄÀÕË÷Èí¼þ°üÀ¨REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬ £¬£¬£¬±¾¼¾¶ÈµÄÇå¾²¼ì²âÈÆ¹ýÊÖÒÕµÄʹÓÃÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html