Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ
Ðû²¼Ê±¼ä 2021-11-10Robinhoodƽ̨³ÆÒòÔâµ½¹¥»÷700Íò¿Í»§ÐÅϢй¶
¹ÉƱÉúÒâÆ½Ì¨RobinhoodÔÚ11ÔÂ8ÈÕÐû²¼Í¨¸æ£¬£¬£¬Éù³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ11ÔÂ3ÈÕ£¬£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¹¥»÷»ñµÃÁ˿ͻ§Ö§³ÖϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬¿ÉÄÜÒѾ»á¼ûÁËÔ¼700Íò¿Í»§µÄÊý¾Ý£¬£¬£¬Éæ¼°ÐÕÃû¡¢ÓʼþµØµã¡¢³öÉúÈÕÆÚºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬RobinHoodÌåÏÖËûÃÇ»¹Ôâµ½ÁËÀÕË÷£¬£¬£¬µ«²¢Î´ÌṩÓйØÀÕË÷ÒªÇóµÄϸ½ÚÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÇå¾²¹«Ë¾MandiantµÄÐÖú϶ԴËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/
¶à¹úÖ´·¨²¿·ÖÕö¿ªµÄCycloneÐж¯Àֳɹ¥»÷ClopÍÅ»ï
ÉÏÖÜÎ壬£¬£¬Ïà¹Ø²¿·Ö¹ûÕæÁ˹ØÓÚCycloneÐж¯µÄ×îÐÂÐÂÎÅ¡£¡£¡£¡£¡£ÕâÊÇΪÆÚ30¸öÔµĹú¼ÊÖ´·¨Ðж¯£¬£¬£¬Óɹú¼ÊÐ̾¯×é֯е÷£¬£¬£¬²¢ÁªºÏÁËÎÚ¿ËÀ¼ºÍÃÀ¹úÖ´·¨²¿·Ö¡£¡£¡£¡£¡£Ðж¯µÄÖ÷ҪĿµÄÊÇClop£¬£¬£¬ËüÔø¶à´Î¹¥»÷Á˺«¹úµÄ¹«Ë¾ºÍÃÀ¹úµÄѧÊõ»ú¹¹¡£¡£¡£¡£¡£CycloneÐж¯»ñµÃÁËCDI¡¢Kaspersky¡¢FortinetºÍGroup-IBµÈ¹«Ë¾µÄ×ÊÖú£¬£¬£¬ÔÚÎÚ¿ËÀ¼¾Ð²¶ÁË6ÃûÏÓÒÉÈË£¬£¬£¬²¢Ã»ÊÕÁË185000ÃÀÔªµÄÏֽ𡣡£¡£¡£¡£ÈôÊÇ×ïÃû½¨É裬£¬£¬Õâ6¸öÏÓÒÉÈ˽«ÃæÁÙ×î¸ß°ËÄêµÄî¿Ïµ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/operation-cyclone-deals-blow-to-clop-ransomware-operation/
unit42Åû¶ʹÓÃÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú
unit42ÔÚ11ÔÂ7ÈÕÅû¶ÁËʹÓÃManageEngine ADSelfService PlusÖÐÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú¡£¡£¡£¡£¡£9ÔÂ16ÈÕ£¬£¬£¬CISAÔøÐû²¼¾¯±¨³ÆAPT×éÖ¯ÕýÔÚʹÓøÃÎó²î¹¥»÷Êý°Ù¸öÒ×Êܹ¥»÷µÄ×éÖ¯¡£¡£¡£¡£¡£¹¥»÷×îÏÈÓÚ9ÔÂ22ÈÕ£¬£¬£¬Õë¶ÔÈ«Çò¹æÄ£ÄڵĹú·À¡¢Ò½ÁƱ£½¡¡¢ÄÜÔ´ºÍ½ÌÓýÐÐÒµµÈÖÁÉÙÓоŸöÐÐÒµ¡£¡£¡£¡£¡£ÔÚÎó²îʹÓÃÀÖ³ÉÖ®ºó£¬£¬£¬¹¥»÷Õß»á×°ÖÃGodzilla webshell¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Éв»ÇåÎú»î¶¯±³ºóµÄ¹¥»÷ÍŻ£¬£¬µ«»òÐíÓëAPT27£¨Emissary Panda£©Óйء£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/
DetectifyÐÂÑо¿·¢Ã÷SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢
Detectify 11ÔÂ4ÈÕµÄ×îÐÂÑо¿·¢Ã÷£¬£¬£¬SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£×Ô7Ô·ÝÒÔÀ´£¬£¬£¬DetectifyÒÑ¾ÍøÂçºÍÆÊÎöÁËÁè¼Ý9ÒÚ¸ö¹«¹²SSL/TLSÖ¤Ê飬£¬£¬²¢·¢Ã÷ÆäÖб£´æµÄ¡°ÏÝÚ塱¿ÉÄÜ»áй¶¹«Ë¾µÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¾ø´ó´ó¶¼ÐÂÈÏÖ¤µÄÓò¶¼±»¸¶ÓëÁËÐÎòÐÔÃû³Æ£¬£¬£¬ÈôÊÇÖ¤ÊéÊÇÔÚ¹ûÕæÇ°µÄ¿ª·¢½×¶Î½ÒÏþµÄ£¬£¬£¬¿ÉÄÜÈþºÕùµÐÊÖÓÐʱ¼äÔÚвúÆ·½øÈëÊг¡Ö®Ç°¾ÙÐÐÆÆË𡣡£¡£¡£¡£±ðµÄ£¬£¬£¬Í¨Åä·ûÖ¤Êé¿ÉÄÜ»áÊܵ½ALPACA¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.detectify.com/2021/11/04/new-research-are-ssl-certificates-leaking-company-secrets/
Intel 471Ðû²¼Õë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ
Intel 471ÔÚ11ÔÂ2ÈÕÐû²¼ÁËÕë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬´ó×ÚºÚ¿ÍÔÚ°µÍø³öÊÛÔËÊäºÍÎïÁ÷×éÖ¯µÄ»á¼ûȨÏÞ£¬£¬£¬²¢ÍƶÏËûÃÇÊÇʹÓÃÔ¶³Ì»á¿´·¨¾ö¼Æ»®£¨°üÀ¨Ô¶³Ì×ÀÃæÐÒéRDP¡¢VPN¡¢CitrixºÍSonicWallµÈ£©ÖеÄÎó²î»ñµÃµÄ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÎïÊ¢ÐÐÒµÖð½¥³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬¹¥»÷¿ÉÄÜ»á¶ÔÈ«Çò¾¼ÃÔì³ÉÑÏÖØµÄÁ¬Ëø·´Ó¦£¬£¬£¬Ò»´ÎÀֳɵĹ¥»÷¿ÉÄÜ»áʹÕû¸öÐÐÒµÕϰ£¬£¬£¬Òò´ËÏà¹Ø×éÖ¯Òª×Ô¶¯ÐÞ¸´Îó²îÒÔ×èÖ¹´ËÀ๥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://intel471.com/blog/shipping-companies-ransomware-credentials
Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ
Positive TechnologiesÔÚ11ÔÂ3ÈÕÐû²¼ÁËRootkitµÄÑݱäÇ÷ÊÆºÍÄ¿½ñÍþвµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁ˽ü10Äê×îÖøÃûµÄ16¸örootkit¼Ò×壬£¬£¬·¢Ã÷ÆäÖеÄ44%ÓÃÓÚ¹¥»÷Õþ¸®»ú¹¹£¬£¬£¬ 77%±»ÓÃÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬rootkitºÜÄÑ¿ª·¢£¬£¬£¬Ðè񻮮·ÑÐí¶àʱ¼äºÍ¿î×Ó£¬£¬£¬Òò´Ë´ó´ó¶¼»ùÓÚrootkitµÄ¹¥»÷¶¼ÓëAPT×éÖ¯Óйء£¡£¡£¡£¡£ËùÓеÄrootkitÖÐ38%ÊôÓÚÄÚºËģʽ£¬£¬£¬31%ÊÇÓû§Ä£Ê½£¬£¬£¬31%ÊÇ×éºÏÀàÐÍ£¬£¬£¬ÇҴ󲿷ÖÕë¶ÔWindowsϵͳ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/