Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ

Ðû²¼Ê±¼ä 2021-11-10

Robinhoodƽ̨³ÆÒòÔâµ½¹¥»÷700Íò¿Í»§ÐÅϢй¶


Robinhoodƽ̨³ÆÒòÔâµ½¹¥»÷700Íò¿Í»§ÐÅϢй¶.png


¹ÉƱÉúÒâÆ½Ì¨RobinhoodÔÚ11ÔÂ8ÈÕÐû²¼Í¨¸æ £¬£¬£¬Éù³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷¡£ ¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ11ÔÂ3ÈÕ £¬£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¹¥»÷»ñµÃÁ˿ͻ§Ö§³ÖϵͳµÄ»á¼ûȨÏÞ £¬£¬£¬¿ÉÄÜÒѾ­»á¼ûÁËÔ¼700Íò¿Í»§µÄÊý¾Ý £¬£¬£¬Éæ¼°ÐÕÃû¡¢ÓʼþµØµã¡¢³öÉúÈÕÆÚºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£ ¡£¡£¡£¡£±ðµÄ £¬£¬£¬RobinHoodÌåÏÖËûÃÇ»¹Ôâµ½ÁËÀÕË÷ £¬£¬£¬µ«²¢Î´ÌṩÓйØÀÕË÷ÒªÇóµÄϸ½ÚÐÅÏ¢¡£ ¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÇå¾²¹«Ë¾MandiantµÄЭÖú϶ԴËÊÂÕö¿ªÊӲ졣 ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/


¶à¹úÖ´·¨²¿·ÖÕö¿ªµÄCycloneÐж¯Àֳɹ¥»÷ClopÍÅ»ï


¶à¹úÖ´·¨²¿·ÖÕö¿ªµÄCycloneÐж¯Àֳɹ¥»÷ClopÍÅ»ï.png


ÉÏÖÜÎå £¬£¬£¬Ïà¹Ø²¿·Ö¹ûÕæÁ˹ØÓÚCycloneÐж¯µÄ×îÐÂÐÂÎÅ¡£ ¡£¡£¡£¡£ÕâÊÇΪÆÚ30¸öÔµĹú¼ÊÖ´·¨Ðж¯ £¬£¬£¬Óɹú¼ÊÐ̾¯×é֯Эµ÷ £¬£¬£¬²¢ÁªºÏÁËÎÚ¿ËÀ¼ºÍÃÀ¹úÖ´·¨²¿·Ö¡£ ¡£¡£¡£¡£Ðж¯µÄÖ÷ҪĿµÄÊÇClop £¬£¬£¬ËüÔø¶à´Î¹¥»÷Á˺«¹úµÄ¹«Ë¾ºÍÃÀ¹úµÄѧÊõ»ú¹¹¡£ ¡£¡£¡£¡£CycloneÐж¯»ñµÃÁËCDI¡¢Kaspersky¡¢FortinetºÍGroup-IBµÈ¹«Ë¾µÄ×ÊÖú £¬£¬£¬ÔÚÎÚ¿ËÀ¼¾Ð²¶ÁË6ÃûÏÓÒÉÈË £¬£¬£¬²¢Ã»ÊÕÁË185000ÃÀÔªµÄÏֽ𡣠¡£¡£¡£¡£ÈôÊÇ×ïÃû½¨Éè £¬£¬£¬Õâ6¸öÏÓÒÉÈ˽«ÃæÁÙ×î¸ß°ËÄêµÄî¿Ïµ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/operation-cyclone-deals-blow-to-clop-ransomware-operation/


unit42Åû¶ʹÓÃÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú


unit42Åû¶ʹÓÃÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú.png


unit42ÔÚ11ÔÂ7ÈÕÅû¶ÁËʹÓÃManageEngine ADSelfService PlusÖÐÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú¡£ ¡£¡£¡£¡£9ÔÂ16ÈÕ £¬£¬£¬CISAÔøÐû²¼¾¯±¨³ÆAPT×éÖ¯ÕýÔÚʹÓøÃÎó²î¹¥»÷Êý°Ù¸öÒ×Êܹ¥»÷µÄ×éÖ¯¡£ ¡£¡£¡£¡£¹¥»÷×îÏÈÓÚ9ÔÂ22ÈÕ £¬£¬£¬Õë¶ÔÈ«Çò¹æÄ£ÄڵĹú·À¡¢Ò½ÁƱ£½¡¡¢ÄÜÔ´ºÍ½ÌÓýÐÐÒµµÈÖÁÉÙÓоŸöÐÐÒµ¡£ ¡£¡£¡£¡£ÔÚÎó²îʹÓÃÀÖ³ÉÖ®ºó £¬£¬£¬¹¥»÷Õß»á×°ÖÃGodzilla webshell¡£ ¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬Éв»ÇåÎú»î¶¯±³ºóµÄ¹¥»÷ÍÅ»ï £¬£¬£¬µ«»òÐíÓëAPT27£¨Emissary Panda£©ÓйØ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/


DetectifyÐÂÑо¿·¢Ã÷SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢


DetectifyÐÂÑо¿·¢Ã÷SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢.png


Detectify 11ÔÂ4ÈÕµÄ×îÐÂÑо¿·¢Ã÷ £¬£¬£¬SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢¡£ ¡£¡£¡£¡£×Ô7Ô·ÝÒÔÀ´ £¬£¬£¬DetectifyÒѾ­ÍøÂçºÍÆÊÎöÁËÁè¼Ý9ÒÚ¸ö¹«¹²SSL/TLSÖ¤Êé £¬£¬£¬²¢·¢Ã÷ÆäÖб£´æµÄ¡°ÏÝÚ塱¿ÉÄÜ»áй¶¹«Ë¾µÄÉñÃØÐÅÏ¢¡£ ¡£¡£¡£¡£¾ø´ó´ó¶¼ÐÂÈÏÖ¤µÄÓò¶¼±»¸¶ÓëÁËÐÎòÐÔÃû³Æ £¬£¬£¬ÈôÊÇÖ¤ÊéÊÇÔÚ¹ûÕæÇ°µÄ¿ª·¢½×¶Î½ÒÏþµÄ £¬£¬£¬¿ÉÄÜÈþºÕùµÐÊÖÓÐʱ¼äÔÚвúÆ·½øÈëÊг¡Ö®Ç°¾ÙÐÐÆÆËð¡£ ¡£¡£¡£¡£±ðµÄ £¬£¬£¬Í¨Åä·ûÖ¤Êé¿ÉÄÜ»áÊܵ½ALPACA¹¥»÷µÄÓ°Ïì¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.detectify.com/2021/11/04/new-research-are-ssl-certificates-leaking-company-secrets/


Intel 471Ðû²¼Õë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ


Intel 471Ðû²¼Õë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ.png


Intel 471ÔÚ11ÔÂ2ÈÕÐû²¼ÁËÕë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬´ó×ÚºÚ¿ÍÔÚ°µÍø³öÊÛÔËÊäºÍÎïÁ÷×éÖ¯µÄ»á¼ûȨÏÞ £¬£¬£¬²¢ÍƶÏËûÃÇÊÇʹÓÃÔ¶³Ì»á¿´·¨¾ö¼Æ»®£¨°üÀ¨Ô¶³Ì×ÀÃæÐ­ÒéRDP¡¢VPN¡¢CitrixºÍSonicWallµÈ£©ÖеÄÎó²î»ñµÃµÄ¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬ÎïÊ¢ÐÐÒµÖð½¥³ÉΪ¹¥»÷Ä¿µÄ £¬£¬£¬¹¥»÷¿ÉÄÜ»á¶ÔÈ«Çò¾­¼ÃÔì³ÉÑÏÖØµÄÁ¬Ëø·´Ó¦ £¬£¬£¬Ò»´ÎÀֳɵĹ¥»÷¿ÉÄÜ»áʹÕû¸öÐÐÒµÕϰ­ £¬£¬£¬Òò´ËÏà¹Ø×éÖ¯Òª×Ô¶¯ÐÞ¸´Îó²îÒÔ×èÖ¹´ËÀ๥»÷¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://intel471.com/blog/shipping-companies-ransomware-credentials


Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ


Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ.png


Positive TechnologiesÔÚ11ÔÂ3ÈÕÐû²¼ÁËRootkitµÄÑݱäÇ÷ÊÆºÍÄ¿½ñÍþвµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁ˽ü10Äê×îÖøÃûµÄ16¸örootkit¼Ò×å £¬£¬£¬·¢Ã÷ÆäÖеÄ44%ÓÃÓÚ¹¥»÷Õþ¸®»ú¹¹ £¬£¬£¬ 77%±»ÓÃÓÚÍøÂçÌØ¹¤»î¶¯¡£ ¡£¡£¡£¡£±ðµÄ £¬£¬£¬rootkitºÜÄÑ¿ª·¢ £¬£¬£¬Ðè񻮮·ÑÐí¶àʱ¼äºÍ¿î×Ó £¬£¬£¬Òò´Ë´ó´ó¶¼»ùÓÚrootkitµÄ¹¥»÷¶¼ÓëAPT×éÖ¯ÓйØ¡£ ¡£¡£¡£¡£ËùÓеÄrootkitÖÐ38%ÊôÓÚÄÚºËģʽ £¬£¬£¬31%ÊÇÓû§Ä£Ê½ £¬£¬£¬31%ÊÇ×éºÏÀàÐÍ £¬£¬£¬ÇҴ󲿷ÖÕë¶ÔWindowsϵͳ¡£ ¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/