Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
Ðû²¼Ê±¼ä 2022-03-02Òò¹©Ó¦ÉÌÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú
ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼£¬£¬£¬£¬£¬£¬£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÆäÖ÷ÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ£¬£¬£¬£¬£¬£¬£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5%£¬£¬£¬£¬£¬£¬£¬Ô¼ºÏ13000Á¾Æû³µ¡£¡£¡£¡£¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú£¬£¬£¬£¬£¬£¬£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄÏêϸӰÏì¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖÐÖ¹»áÒ»Á¬¶à¾Ã¡£¡£¡£¡£¡£
https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/
°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓÐЧÀÍÖÐÖ¹
¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂ磬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕËùÓÐЧÀÍ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½£¬£¬£¬£¬£¬£¬£¬Õâ¶ÔÁгµµÄÔËÓª±¬·¢Á˼«´óµÄÓ°Ïì¡£¡£¡£¡£¡£¼¸ÈÕǰ£¬£¬£¬£¬£¬£¬£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html
Ñо¿ÍŶӷ¢Ã÷Õë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯
¾Ý2ÔÂ24Èյı¨µÀ£¬£¬£¬£¬£¬£¬£¬Bitdefender·¢Ã÷Á˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ£¬£¬£¬£¬£¬£¬£¬ÒÔÕË»§¶³½áΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄ´¹ÂÚÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂ룬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÒøÐÐÕË»§ÖеÄÓà¶î¡£¡£¡£¡£¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý£¬£¬£¬£¬£¬£¬£¬´ó²¿·Ö´¹ÂÚÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎΪӢ¹ú£¨7%£©£»£»£»£»£»´ó²¿·ÖÓʼþÀ´×ÔÃÀ¹úµÄIPµØµã£¨40%£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/
Ñо¿Ö°Ô±¹ûÕæÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄ̸Ìì¼Í¼
2ÔÂ27ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõ̸Ìì¼Í¼¹ûÕæ¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿Ö°Ô±Ð¹Â¶µÄ£¬£¬£¬£¬£¬£¬£¬Ëû¿ÉÒÔ»á¼ûContiµÄXMPP̸ÌìЧÀÍÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë£¬£¬£¬£¬£¬£¬£¬×ܹ²ÓÐ393¸öJSONÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÐÂÎÅ¡£¡£¡£¡£¡£ÕâЩ¼ÍÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖֻµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÒÔǰδ¹ûÕæµÄ±»¹¥»÷Ä¿µÄ¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØµãÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/
CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ
2ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬ÒѸüÐÂÁËÆß´Î¡£¡£¡£¡£¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÍøÂç´¹ÂÚµç×ÓÓʼþ½øÈëÄ¿µÄϵͳ¡£¡£¡£¡£¡£ÆäÁ¬ÏµÁËÇÔÈ¡³ÌÐò¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨѶ£¬£¬£¬£¬£¬£¬£¬Ö§³ÖTorÍøÂ磬£¬£¬£¬£¬£¬£¬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots£¬£¬£¬£¬£¬£¬£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£¡£¡£¡£¡£
https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/
Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄÆÊÎö±¨¸æ
¾Ý2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Intel 471Åû¶Á˰´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨѶÀ´¼ìË÷¶ñÒâpayloadµÄURL£¬£¬£¬£¬£¬£¬£¬²¢×°ÖÃÔÚÄ¿µÄÖ÷»úÉÏ£¬£¬£¬£¬£¬£¬£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£¡£¡£¡£¡£Í¨³£ÒÀÀµ¾ÓÉSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬¿É×°Öò¢Ö´ÐжàÖÖ¶ñÒâpayload£¬£¬£¬£¬£¬£¬£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£¡£¡£¡£¡£
https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/
Çå¾²¹¤¾ß
DRAKVUF Sandbox
×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þÆÊÎöϵͳ£¬£¬£¬£¬£¬£¬£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ£¬£¬£¬£¬£¬£¬£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£¡£¡£¡£¡£
https://github.com/CERT-Polska/drakvuf-sandbox
StayKit
Cobalt Strike ³¤ÆÚÐÔµÄÀ©Õ¹£¬£¬£¬£¬£¬£¬£¬ËüʹÓà SharpStay .NET ³ÌÐò¼¯µÄ execute_assembly º¯Êý¡£¡£¡£¡£¡£
https://github.com/0xthirteen/StayKit
Fennec
Óà Rust ±àдµÄ¹¤¼þÍøÂ繤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄÊÂÎñÏìӦʱ´úʹÓᣡ£¡£¡£¡£
https://github.com/AbdulRhmanAlfaifi/Fennec
request smuggler
Http ÇëÇó×ß˽Îó²îɨÃèÆ÷£¬£¬£¬£¬£¬£¬£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽Îó²î¹¥»÷µÄЧÀÍÆ÷¡£¡£¡£¡£¡£
https://github.com/Sh1Yo/request_smuggler
Shellcode Template
ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£¡£¡£¡£¡£
https://github.com/Cracked5pider/ShellcodeTemplate
Çå¾²ÆÊÎö
CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/
ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â
https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/
ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã
https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/
΢ÈíÐû²¼ÔÚ Windows 11 ÖоÙÐÐÐ嵀 Windows ¸üÐÂË¢ÐÂ
https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml