MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ

Ðû²¼Ê±¼ä 2021-10-28

EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷


EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷.png


Çå¾²¹«Ë¾EmsisoftÔÚ10ÔÂ24ÈÕ¹ûÕæÁËÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£½ñÄêÔçЩʱ¼ä£¬ £¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷BlackMatterÖб£´æÒ»¸ö¿ÉÓÃÓÚ»Ö¸´¼ÓÃÜÎļþÎó²î£¬ £¬£¬£¬ £¬£¬£¬²¢ÇÒËûÃÇÔÚ֮ǰһֱûÓÐ͸¶¸ÃÎó²îµÄ±£´æ£¬ £¬£¬£¬ £¬£¬£¬ÒÔ±ÜÃâ¸ÃÍÅ»ïÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£¡£²»ÐÒµÄÊÇ£¬ £¬£¬£¬ £¬£¬£¬BlackMatterÔÚ9ÔÂβ·¢Ã÷²¢ÐÞ¸´Á˸ÃÎó²î£¬ £¬£¬£¬ £¬£¬£¬Òò´ËÕâ¸ö½âÃÜÆ÷½öÄܽâÃÜ2021Äê7ÔÂÖÐÑ®ÖÁ9ÔÂÏÂѮ֮¼ä±»¼ÓÃܵÄÎļþ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123736/security/blackmatter-decryptor-pat-victims.html



DiscourseÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-41163


DiscourseÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-41163.png


DiscourseÔÚ10ÔÂ21ÈÕÐû²¼Çå¾²¸üУ¬ £¬£¬£¬ £¬£¬£¬ÐÞ¸´ÁËÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-41163¡£¡£¡£¡£¡£¡£¡£DiscourseÊÇ¿ªÔ´µÄÂÛ̳ÌÖÂÛÆ½Ì¨£¬ £¬£¬£¬ £¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ10£¬ £¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆµÄÇëÇóÀ´Ô¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£Îó²îÊÇÓÉÓÚsubscribe_urlֵȱ·¦ÑéÖ¤µ¼Öµģ¬ £¬£¬£¬ £¬£¬£¬ÏÖÔÚÒÑÐû²¼²¹¶¡£¡£¡£¡£¡£¡£¡£» £»£»£»£»ÈôÊDz»×°Öò¹¶¡£¡£¡£¡£¡£¡£¡£¬ £¬£¬£¬ £¬£¬£¬¿ÉÒÔͨ¹ýÔÚÉÏÓÎÊðÀí×èÖ¹ÒÔ/webhooks/aws¿ªÍ·µÄ·¾¶µÄÇëÇóÀ´»º½âÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/10/24/critical-rce-vulnerability-discourse



Ñо¿Ö°Ô±ÔÚº«¹ú·¢Ã÷ͨ¹ýÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯


Ñо¿Ö°Ô±ÔÚº«¹ú·¢Ã÷ͨ¹ýÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯.png


10ÔÂ21ÈÕ£¬ £¬£¬£¬ £¬£¬£¬ASECµÄÑо¿Ö°Ô±·¢Ã÷Õë¶Ôº«¹úʹÓÃÍøÂçÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏȽ«njRATºÍUDP RATµÈ¶ñÒâÈí¼þ·â×°ÔÚÒ»¸öÓÎÏ·°üÖУ¬ £¬£¬£¬ £¬£¬£¬È»ºó½«ËüÃÇÉÏ´«µ½º«¹úµÄÔÚÏߴ洢ЧÀÍwebhardsÖС£¡£¡£¡£¡£¡£¡£Ä¿µÄÏÂÔØ²¢½âѹZIPÃûÌõÄÓÎÏ·ºó»á»ñµÃÒ»¸ögame.exe£¬ £¬£¬£¬ £¬£¬£¬ÔËÐиÃÎļþÖ®ºó»á×°ÖÃÒ»¸öRAT²¢´æÈëλÓÚC:\ProgramFiles\4.0389µÄÎļþ¼ÐÖУ¬ £¬£¬£¬ £¬£¬£¬Í¬Ê±»¹»á½¨ÉèÒ»¸öеÄGame.exeÀ´ÔËÐÐÓÎÏ·¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/rat-malware-spreading-in-korea-through-webhards-and-torrents/


¹¥»÷ÍÅ»ïʹÓüƷÑÓ¦ÓÃBillQuick·Ö·¢ÀÕË÷Èí¼þ


¹¥»÷ÍÅ»ïʹÓüƷÑÓ¦ÓÃBillQuick·Ö·¢ÀÕË÷Èí¼þ.png


Huntress ThreatOpsÍŶӷ¢Ã÷¼ÆÊ±¼Æ·ÑÓ¦ÓÃBillQuick±£´æSQL×¢ÈëÎó²îCVE-2021-42258¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ÉÒÔͨ¹ýÔÚÓû§Ãû×Ö¶ÎÖÐʹÓÃÎÞЧ×Ö·û£¨µ¥ÒýºÅ£©µÇ¼ÇëÇóÀ´´¥·¢¸ÃÎó²î£¬ £¬£¬£¬ £¬£¬£¬²¢Ô¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӳƣ¬ £¬£¬£¬ £¬£¬£¬ËûÃÇÔÚ2021Äê10ÔÂ8ÈÕÖÁ10ÈÕ·¢Ã÷ÁËʹÓøÃÎó²î·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯£¬ £¬£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄÍÅ»ïÉв»Ã÷È·£¬ £¬£¬£¬ £¬£¬£¬µ«ÀÕË÷Èí¼þ×Ô2020Äê5ÔÂÒÔÀ´¾ÍÒ»Ö±ÔÚʹÓᣡ£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬ £¬£¬£¬¸ÃÎó²îÒÑÓÚ10ÔÂ7ÈÕÐÞ¸´£¬ £¬£¬£¬ £¬£¬£¬µ«Ñо¿Ö°Ô±»¹·¢Ã÷ÁËBillQuickÖÐµÄÆäËû8¸ö0 day¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/10/hackers-exploited-popular-billquick.html



MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ


MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ.png


MicrosoftÍþвÇ鱨ÖÐÐÄÔÚ10ÔÂ25ÈÕÐû²¼Á˹ØÓÚNOBELIUMÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£NOBELIUMÊÇ2020Äê12ÔÂÕë¶ÔSolarWindsµÄ¹©Ó¦Á´¹¥»÷µÄÄ»ºóºÚÊÖ£¬ £¬£¬£¬ £¬£¬£¬×Ô2021Äê5ÔÂÒÔÀ´£¬ £¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÔÚÃÀ¹úºÍÅ·ÖÞÌᳫÁËÓÐÕë¶ÔÐԵũӦÁ´¹¥»÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯²¢Î´Ê¹ÓÃÈκÎÎó²î£¬ £¬£¬£¬ £¬£¬£¬¶øÊÇʹÓÃÃÜÂëÅçÉä¡¢ÁîÅÆÍµÇÔ¡¢APIÀÄÓúÍÓã²æÊ½ÍøÂç´¹ÂڵȶàÖÖÊÖÒÕÀ´ÇÔÌØÈ¨ÕÊ»§µÄƾ֤£¬ £¬£¬£¬ £¬£¬£¬´Ó¶øÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/



NeustarÐû²¼2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ


NeustarÐû²¼2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ.png


Neustar¹ú¼ÊÇ徲ίԱ»á(NISC)Ðû²¼ÁË2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬ £¬£¬£¬ £¬£¬£¬72%µÄ×éÖ¯ÔÚÒÑÍù12¸öÔÂÄÚÖÁÉÙÂÄÀú¹ýÒ»´ÎDNS¹¥»÷£¬ £¬£¬£¬ £¬£¬£¬ÆäÖÐ×î³£¼ûµÄDNS¹¥»÷ÀàÐÍDNSÐ®ÖÆ (47%)¡¢DNSºé·º·´Éä»ò·Å´ó¹¥»÷µÈDDoS¹¥»÷(46%)¡¢DNSËíµÀ(35%)»ººÍ´æÖж¾(33%)¡£¡£¡£¡£¡£¡£¡£2021Äê7ÔÂÖÁ8Ô£¬ £¬£¬£¬ £¬£¬£¬DDoSÊÇ×îÊܹØ×¢µÄÎÊÌ⣬ £¬£¬£¬ £¬£¬£¬Æä´ÎÊÇϵͳÈëÇÖºÍÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.niscicb.com/LatestResults